Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2002-1040
Unknown vulnerability in the WebSecure (DFSWeb) configuration utilities in AIX 4.x, possibly related to relative pathnames.
Ibm Aix
445
VMScore
CVE-2000-0441
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.3.1
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 3.2
409
VMScore
CVE-2007-0670
Buffer overflow in bos.rte.libc in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via the "r-commands", possibly including (1) rdist, (2) rsh, (3) rcp, (4) rsync, and (5) rlogin.
Ibm Aix 5.3
Ibm Aix 5.2
409
VMScore
CVE-2001-1095
Buffer overflow in uuq in AIX 4 could allow local users to execute arbitrary code via a long -r parameter.
Ibm Aix 4.0
409
VMScore
CVE-2001-1096
Buffer overflows in muxatmd in AIX 4 allows an malicious user to cause a core dump and possibly execute code.
Ibm Aix 4.0
409
VMScore
CVE-2001-0573
lsfs in AIX 4.x allows a local user to gain additional privileges by creating Trojan horse programs named (1) grep or (2) lslv in a certain directory that is under the user's control, which cause lsfs to access the programs in that directory.
Ibm Aix 4
215
VMScore
CVE-2000-0873
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Ibm Aix 4.2
Ibm Aix 4.3.1
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3