Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0111
RIP v1 is susceptible to spoofing.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
NA
CVE-1999-0118
AIX infod allows local users to gain root access through an X display.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
1 EDB exploit
NA
CVE-1999-0086
AIX routed allows remote users to modify sensitive files.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
NA
CVE-1999-0101
Buffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names.
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
1 EDB exploit
NA
CVE-1999-1208
Buffer overflow in ping in AIX 4.2 and previous versions allows local users to gain root privileges via a long command line argument.
Ibm Aix 3.2.5
Ibm Aix 4.2
Ibm Aix 4.1
1 EDB exploit
NA
CVE-1999-0087
Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
NA
CVE-1999-0090
Buffer overflow in AIX rcp command allows local users to obtain root access.
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1
Ibm Aix 4.1.3
NA
CVE-1999-0093
AIX nslookup command allows local users to obtain root access by not dropping privileges correctly.
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
NA
CVE-1999-0094
AIX piodmgrsu command allows local users to gain additional group privileges.
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
NA
CVE-1999-0122
Buffer overflow in AIX lchangelv gives root access.
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »