Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.2.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0441
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
Ibm Aix 4.1.3
Ibm Aix 4.1.5
Ibm Aix 4.3.2
Ibm Aix 3.2.4
Ibm Aix 3.2.5
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 3.2
Ibm Aix 4.1.2
Ibm Aix 4.1.4
4.6
CVSSv2
CVE-2000-1119
Buffer overflow in setsenv command in IBM AIX 4.3.x and previous versions allows local users to execute arbitrary commands via a long "x=" argument.
Ibm Aix 4.3.2
Ibm Aix 4.3.3
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
1 EDB exploit
4.6
CVSSv2
CVE-1999-1079
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
Ibm Aix 3.2.5
Ibm Aix 4.1
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.3.2
Ibm Aix 4.1.5
Ibm Aix 4.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
2.1
CVSSv2
CVE-2000-0873
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
Ibm Aix 4.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.2.1
Ibm Aix 4.3
1 EDB exploit
2.1
CVSSv2
CVE-1999-1117
lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
Ibm Aix 4.1
Ibm Aix 4.2
1 EDB exploit
1.2
CVSSv2
CVE-1999-1486
sadc in IBM AIX 4.1 up to and including 4.3, when called from programs such as timex that are setgid adm, allows local users to overwrite arbitrary files via a symlink attack.
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.1
Ibm Aix 4.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3