Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-0745
Buffer overflow in uucp in AIX 4.3.3.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2002-0747
Buffer overflow in lsmcode in AIX 4.3.3.
Ibm Aix 4.3.3
1 EDB exploit
10
CVSSv2
CVE-2002-0743
mail and mailx in AIX 4.3.3 core dump when called with a very long argument, an indication of a buffer overflow.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2002-0746
Vulnerability in template.dhcpo in AIX 4.3.3 related to an insecure linker argument.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2002-1621
Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote malicious users to execute arbitrary code.
Ibm Aix 4.3.1
Ibm Aix 4.3.3
Ibm Aix 5.1
Ibm Aix 4.3
Ibm Aix 4.3.2
10
CVSSv2
CVE-2001-1440
Unknown vulnerability in login for AIX 5.1L, when using loadable authentication modules, allows remote malicious users to gain access to the system.
Ibm Aix 5.1l
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0671
Buffer overflows in (1) send_status, (2) kill_print, and (3) chk_fhost in lpd in AIX 4.3 and 5.1 allow remote malicious users to gain root privileges.
Ibm Aix 4.3
Ibm Aix 5.1
10
CVSSv2
CVE-2001-1061
Vulnerability in lsmcode in unknown versions of AIX, possibly related to a usage error.
Ibm Aix
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »