Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3 vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2000-1120
Buffer overflow in digest command in IBM AIX 4.3.x and previous versions allows local users to execute arbitrary commands.
Ibm Aix 4.2
Ibm Aix 4.3.3
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
1 EDB exploit
725
VMScore
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Sun Sunos 5.4
Sun Solaris 2.4
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.7
Sun Solaris 7.0
Digital Unix 4.0e
Digital Unix 4.0f
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Solaris 2.5.1
1 EDB exploit
1 Github repository
725
VMScore
CVE-1999-0118
AIX infod allows local users to gain root access through an X display.
Ibm Aix 3.2
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
1 EDB exploit
725
VMScore
CVE-1999-0014
Unauthorized privileged access or denial of service via dtappgather program in CDE.
Cde Cde 1.02 X86
Cde Cde 1.2
Cde Cde 1.2 X86
Cde Cde 1.01 X86
Cde Cde 1.01
Cde Cde 1.02
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
Hp Hp-ux 10.20
Hp Vvos 10.24
Hp Hp-ux 10.10
Hp Hp-ux 11.00
1 EDB exploit
668
VMScore
CVE-2003-0119
The secldapclntd daemon in AIX 4.3, 5.1 and 5.2 uses an Internet socket when communicating with the loadmodule, which allows remote malicious users to directly connect to the daemon and conduct unauthorized activities.
Ibm Aix 4.3.3
Ibm Aix 5.1
Ibm Aix 5.2
668
VMScore
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
668
VMScore
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
668
VMScore
CVE-2002-1622
Buffer overflow in certain RPC routines in IBM AIX 4.3 may allow malicious users to execute arbitrary code, related to a "variable data type."
Ibm Aix 4.3
668
VMScore
CVE-2001-1557
Buffer overflow in ftpd in IBM AIX 4.3 and 5.1 allows malicious users to gain privileges.
Ibm Aix 4.3
Ibm Aix 5.1
668
VMScore
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 2.120
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.3
Sun Sunos 5.4
Digital Unix 4.0f
Ibm Aix 4.2
Ibm Aix 4.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »