Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.2.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-1487
Vulnerability in digest in AIX 4.3 allows printq users to gain root privileges by creating and/or modifing any file on the system.
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.3
Ibm Aix 4.1
Ibm Aix 4.1.5
Ibm Aix 4.2.1
10
CVSSv2
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Hp Hp-ux 9.09
Sun Sunos 5.4
7.2
CVSSv2
CVE-1999-0092
Various vulnerabilities in the AIX portmir command allows local users to obtain root access.
Ibm Aix 4.2.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0091
Buffer overflow in AIX writesrv command allows local users to obtain root access.
Ibm Aix 4.2.1
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
7.2
CVSSv2
CVE-1999-0072
Buffer overflow in AIX xdat gives root access to local users.
Ibm Aix 4.2.1
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
10
CVSSv2
CVE-1999-0042
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
University Of Washington Pop 3
University Of Washington Imap 4
Ibm Aix 4.2.1
Redhat Linux 2.0
Caldera Openlinux 1.0
Bsdi Bsd Os 3.0
Bsdi Bsd Os 2.1
Redhat Linux 4.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3