Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.2 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs/oncplus
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4
Ibm Aix 5.2.0.50
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2.1.12
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 1.2.1
Ibm Aix 4.3.0
Ibm Aix 430
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 3.2.0
Ibm Aix 4.0
1 EDB exploit
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
10
CVSSv2
CVE-1999-0745
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 3.1
Ibm Aix 2.2.1
Ibm Aix 3.2
1 EDB exploit
10
CVSSv2
CVE-1999-1405
snap command in AIX prior to 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd be...
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
1 EDB exploit
10
CVSSv2
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu03
Data General Dg Ux Y2k Patchr4.12mu03
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 8
Data General Dg Ux Y2k Patchr4.20mu01
Sco Openserver 5.0
Nec Asl Ux 4800 11
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Netbsd Netbsd 1.3
Ibm Aix 4.2
Netbsd Netbsd 1.3.1
Redhat Linux 5.0
Sun Sunos 5.5
Sco Unixware 2.1
Sco Unix 3.2v4
Sun Sunos 5.4
Sco Unixware 7.0
Sun Sunos 5.5.1
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Isc Bind 8.1
Sgi Irix 5.3
Data General Dg Ux 5.4 3.0
Sgi Irix 4.0.5 Iop
Data General Dg Ux 5.4 3.1
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Sgi Irix 3.3.1
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Isc Bind 4.9.6
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Data General Dg Ux 5.4 4.11
2 EDB exploits
10
CVSSv2
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 6.4
Tritreal Ted Cde 4.3
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Ibm Aix 4.3
Hp Hp-ux 10.02
Sun Sunos 5.3
Ibm Aix 4.2.1
Hp Hp-ux 10.01
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Sun Sunos 5.5
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Sun Sunos 5.4
Sun Sunos 5.5.1
Ibm Aix 4.1.2
2 EDB exploits
10
CVSSv2
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Sun Sunos 5.5
Hp Hp-ux 11.00
Hp Hp-ux 10.24
Ibm Aix 4.1.1
Hp Hp-ux 9.00
10
CVSSv2
CVE-1999-0048
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
Debian Netkit 0.07
Nec Ews-ux V
Ibm Aix 4.2
Ibm Aix 3.1
Nec Up-ux V
Nec Asl Ux 4800
Ibm Aix 4.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »