Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.1.1 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv3
CVE-2015-7403
IBM Spectrum Scale 4.1.1.x prior to 4.1.1.3 and General Parallel File System (GPFS) 3.5.x prior to 3.5.0.29 and 4.1.x up to and including 4.1.0.8 on AIX allow local users to cause a denial of service (incorrect pointer dereference and node crash) via unspecified vectors.
Ibm Spectrum Scale 4.1.1.0
Ibm Spectrum Scale 4.1.1.1
Ibm General Parallel File System 3.5
Ibm Spectrum Scale 4.1.1.2
NA
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs/oncplus
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4
Ibm Aix 5.2.0.50
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2.1.12
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 1.2.1
Ibm Aix 4.3.0
Ibm Aix 430
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 3.2.0
Ibm Aix 4.0
1 EDB exploit
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.2.2
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Openafs Openafs 1.1.1a
Gnu Glibc 2.1.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Gnu Glibc 2.2.5
Openafs Openafs 1.2.1
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Openafs Openafs 1.0
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Openafs Openafs 1.1
Gnu Glibc 2.1.1
Openafs Openafs 1.0.2
Gnu Glibc 2.3.1
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
NA
CVE-2000-0441
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.3.1
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 3.2
NA
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.120
Cde Cde 2.0
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Ibm Aix 4.2.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Digital Unix 4.0d
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.1.4
Ibm Aix 4.2
Digital Unix 4.0f
Ibm Aix 4.1.5
Sun Sunos 5.7
Sun Sunos 5.5
NA
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.0
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Sun Solaris 2.4
Digital Unix 4.0d
Digital Unix 4.0e
Sun Solaris 2.5.1
Ibm Aix 4.1.4
Ibm Aix 4.2
Digital Unix 4.0f
Ibm Aix 4.1.5
Sun Sunos 5.7
Sun Sunos 5.5
Sun Solaris 7.0
Ibm Aix 4.1.1
Sun Sunos 5.4
1 EDB exploit
1 Github repository
NA
CVE-1999-1079
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
NA
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Isc Bind 8.1
Sgi Irix 5.3
Data General Dg Ux 5.4 3.0
Sgi Irix 4.0.5 Iop
Data General Dg Ux 5.4 3.1
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Sgi Irix 3.3.1
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Isc Bind 4.9.6
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Data General Dg Ux 5.4 4.11
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »