Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.1.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0064
Buffer overflow in AIX lquerylv program gives root access to local users.
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 3.2
1 EDB exploit
2.1
CVSSv2
CVE-1999-1408
Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost.
Hp Hp-ux 10.01
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Ibm Aix 4.1.2
Hp Hp-ux 10.20
Ibm Aix 4.1
Ibm Aix 4.1.3
1 EDB exploit
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
7.2
CVSSv2
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Ibm Aix 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege
CVE-2022-48762
CVE-2022-48751
CVE-2024-37079
CVE-2024-30848
LFI
man-in-the-middle
CVE-2022-48736
CVE-2024-30103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3