Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2000-1121
Buffer overflow in enq command in IBM AIX 4.3.x and previous versions may allow local users to execute arbitrary commands via a long -M argument.
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.3.3
1 EDB exploit
7.2
CVSSv2
CVE-2000-1122
Buffer overflow in setclock command in IBM AIX 4.3.x and previous versions may allow local users to execute arbitrary commands via a long argument.
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.2
Ibm Aix 4.3.2
Ibm Aix 4.3.3
7.2
CVSSv2
CVE-2003-0257
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 4.3.2
Ibm Aix 4.3.3
5
CVSSv2
CVE-2000-0441
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
Ibm Aix 4.1.3
Ibm Aix 4.1.5
Ibm Aix 4.3.2
Ibm Aix 3.2.4
Ibm Aix 3.2.5
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 3.2
Ibm Aix 4.1.2
Ibm Aix 4.1.4
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
7.2
CVSSv2
CVE-1999-0055
Buffer overflows in Sun libnsl allow root access.
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Sunos 5.3
Sun Solaris 2.4
Sun Solaris 2.5
Sun Sunos -
Ibm Aix 4.2
Sun Sunos 5.2
Sun Sunos 5.4
Sun Solaris 2.6
7.2
CVSSv2
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Sun Sunos 5.4
Sun Solaris 2.4
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.7
Sun Solaris 7.0
Digital Unix 4.0e
Digital Unix 4.0f
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Solaris 2.5.1
1 EDB exploit
1 Github repository
7.5
CVSSv2
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 2.120
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.3
Sun Sunos 5.4
Digital Unix 4.0f
Ibm Aix 4.2
Ibm Aix 4.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »