Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 4.1.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Tritreal Ted Cde 4.3
Sgi Irix 5.3
Sgi Irix 6.4
Hp Hp-ux 10.03
Hp Hp-ux 11.00
Ibm Aix 4.1
Ibm Aix 4.1.1
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Sunos 4.1.3
Sun Sunos -
Hp Hp-ux 10.02
2 EDB exploits
10
CVSSv2
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Hp Hp-ux 9.09
Sun Sunos 5.4
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 2.120
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.3
Sun Sunos 5.4
Digital Unix 4.0f
Ibm Aix 4.2
Ibm Aix 4.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
7.2
CVSSv2
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Sun Sunos 5.4
Sun Solaris 2.4
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.7
Sun Solaris 7.0
Digital Unix 4.0e
Digital Unix 4.0f
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Solaris 2.5.1
1 EDB exploit
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »