Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs/oncplus
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4
Ibm Aix 5.2.0.50
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2.1.12
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 1.2.1
Ibm Aix 4.3.0
Ibm Aix 430
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 3.2.0
Ibm Aix 4.0
1 EDB exploit
10
CVSSv2
CVE-2002-1621
Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote malicious users to execute arbitrary code.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.3.3
Ibm Aix 4.3.1
Ibm Aix 5.1
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.3.2
Sgi Irix 3.3.1
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.2
Ibm Aix 4.3.2
Sco Openserver 5.0
Ibm Aix 4.3
Sun Sunos 5.3
Hp Hp-ux 11.11
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Sco Openserver 5.0.2
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.8
Sco Openserver 5.0.5
Hp Hp-ux 11.00
Hp Hp-ux 11.0.4
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
10
CVSSv2
CVE-1999-0789
Buffer overflow in AIX ftpd in the libc library.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.3.1
1 EDB exploit
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 6.5.9m
Sgi Irix 6.5.12
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 5.1.1
7.5
CVSSv2
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.120
Cde Cde 2.0
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Ibm Aix 4.2.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Digital Unix 4.0d
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.1.4
Ibm Aix 4.2
Digital Unix 4.0f
Ibm Aix 4.1.5
Sun Sunos 5.7
Sun Sunos 5.5
7.2
CVSSv2
CVE-2003-0257
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 5.2
Ibm Aix 4.3.3
Ibm Aix 4.3.1
Ibm Aix 5.1
7.2
CVSSv2
CVE-2000-1121
Buffer overflow in enq command in IBM AIX 4.3.x and previous versions may allow local users to execute arbitrary commands via a long -M argument.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Ibm Aix 4.2
Ibm Aix 4.3.3
Ibm Aix 4.3.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »