Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-1124
Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.3.3
1 EDB exploit
NA
CVE-2000-1120
Buffer overflow in digest command in IBM AIX 4.3.x and previous versions allows local users to execute arbitrary commands.
Ibm Aix 4.2
Ibm Aix 4.3.3
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
1 EDB exploit
NA
CVE-2000-1123
Buffer overflow in pioout command in IBM AIX 4.3.x and previous versions may allow local users to execute arbitrary commands.
Ibm Aix 4.3.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.3
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
NA
CVE-2000-0873
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
Ibm Aix 4.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.2.1
Ibm Aix 4.3
1 EDB exploit
NA
CVE-2000-0466
AIX cdmount allows local users to gain root privileges via shell metacharacters.
Ibm Aix 4.3
Ibm Aix 4.3.2
Ibm Aix 4.3.1
NA
CVE-2000-0441
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
Ibm Aix 4.1.3
Ibm Aix 4.1.5
Ibm Aix 4.3.2
Ibm Aix 3.2.4
Ibm Aix 3.2.5
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 3.2
Ibm Aix 4.1.2
Ibm Aix 4.1.4
NA
CVE-2000-0249
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
Ibm Aix 4.3
Ibm Aix 4.3.2
Ibm Aix 4.3.1
NA
CVE-1999-0789
Buffer overflow in AIX ftpd in the libc library.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
1 EDB exploit
NA
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 2.120
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.3
Sun Sunos 5.4
Digital Unix 4.0f
Ibm Aix 4.2
Ibm Aix 4.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »