Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2004-2388
rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2004-0368
Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote malicious users to execute arbitrary code via a crafted XDMCP packet.
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 1.0.1
Xi Graphics Dextop 2.1
Xi Graphics Dextop 3.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 2.1.20
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
Ibm Aix 5.2
Ibm Aix 4.3.3
Ibm Aix 5.1
10
CVSSv2
CVE-2003-0784
Format string vulnerability in tsm for the bos.rte.security fileset on AIX 5.2 allows remote malicious users to gain root privileges via login, and local users to gain privileges via login, su, or passwd, with a username that contains format string specifiers.
Ibm Aix 4.3.3
Ibm Aix 5.2
Ibm Aix 5.1
10
CVSSv2
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
10
CVSSv2
CVE-2002-1468
Buffer overflow in errpt in AIX 4.3.3 allows local users to execute arbitrary code as root.
Ibm Aix 4.3.3
1 EDB exploit
10
CVSSv2
CVE-2002-0679
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote malicious users to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
Caldera Unixware 7.1.1
Xi Graphics Dextop 2.1
Caldera Unixware 7.0
Caldera Unixware 7.1.0
Caldera Openunix 8.0
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 9.0
Compaq Tru64 5.1a
Hp Hp-ux 10.10
Sun Sunos 5.5.1
Sun Solaris 2.6
Compaq Tru64 5.0a
Compaq Tru64 5.1
Ibm Aix 4.3.3
Ibm Aix 5.1
Compaq Tru64 4.0f
Compaq Tru64 4.0g
Hp Hp-ux 11.00
Hp Hp-ux 11.11
10
CVSSv2
CVE-2002-0745
Buffer overflow in uucp in AIX 4.3.3.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2002-0742
Buffer overflow in pioout on AIX 4.3.3.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2002-0743
mail and mailx in AIX 4.3.3 core dump when called with a very long argument, an indication of a buffer overflow.
Ibm Aix 4.3.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »