Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0087
Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
NA
CVE-2000-0249
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
Ibm Aix 4.3
Ibm Aix 4.3.2
Ibm Aix 4.3.1
NA
CVE-2003-0697
Format string vulnerability in lpd in the bos.rte.printers fileset for AIX 4.3 up to and including 5.2, with debug enabled, allows local users to cause a denial of service (crash) or gain root privileges.
Ibm Aix 5.1
Ibm Aix 4.3
Ibm Aix 5.2
NA
CVE-2000-0466
AIX cdmount allows local users to gain root privileges via shell metacharacters.
Ibm Aix 4.3
Ibm Aix 4.3.2
Ibm Aix 4.3.1
NA
CVE-1999-0789
Buffer overflow in AIX ftpd in the libc library.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
1 EDB exploit
NA
CVE-2002-1619
Buffer overflow in the FC client for IBM AIX 4.3.x allows remote malicious users to cause a denial of service (crash and core dump).
Ibm Aix 4.3.2
Ibm Aix 4.3.3
Ibm Aix 4.3
Ibm Aix 4.3.1
NA
CVE-1999-0086
AIX routed allows remote users to modify sensitive files.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
NA
CVE-1999-0111
RIP v1 is susceptible to spoofing.
Ibm Aix 4.3
Ibm Aix 4.2
Ibm Aix 4.1
Ibm Aix 3.2
NA
CVE-1999-0118
AIX infod allows local users to gain root access through an X display.
Ibm Aix 3.2
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
1 EDB exploit
NA
CVE-2000-1123
Buffer overflow in pioout command in IBM AIX 4.3.x and previous versions may allow local users to execute arbitrary commands.
Ibm Aix 4.3.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »