Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.1.5 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0064
Buffer overflow in AIX lquerylv program gives root access to local users.
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 3.2
1 EDB exploit
2.1
CVSSv2
CVE-1999-1408
Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost.
Hp Hp-ux 10.20
Hp Hp-ux 9.05
Hp Hp-ux 10.01
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
1 EDB exploit
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
7.2
CVSSv2
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.0
Sgi Irix 6.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Hp Hp-ux 10.00
Ibm Aix 3.1
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 4.1.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3