Vulnerabilities
Vulnerable Software
Ibm:  >> Aix  Security Vulnerabilities
Buffer overflow in certain RPC routines in IBM AIX 4.3 may allow attackers to execute arbitrary code, related to a "variable data type."
CVSS Score
7.5
EPSS Score
0.027
Published
2002-12-31
Buffer overflow in lscfg of unknown versions of AIX has unknown impact.
CVSS Score
10.0
EPSS Score
0.005
Published
2002-12-31
Buffer overflow in the diagnostics library in AIX allows local users to "cause data and instructions to be overwritten" via a long DIAGNOSTICS environment variable.
CVSS Score
2.1
EPSS Score
0.001
Published
2002-12-31
Unknown vulnerability in the login program on AIX before 4.0 could allow remote users to specify 100 or more environment variables when logging on, which exceeds the length of a certain string, possibly triggering a buffer overflow.
CVSS Score
10.0
EPSS Score
0.014
Published
2002-12-31
Unknown vulnerability in AIX before 4.0 with unknown attack vectors and unknown impact, aka "security issue," as fixed by APAR IY28225.
CVSS Score
10.0
EPSS Score
0.005
Published
2002-12-31
IBM AIX 4.3.3 and AIX 5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a flood of malformed TCP packets without any flags set, which prevents AIX from releasing the associated memory buffers.
CVSS Score
5.0
EPSS Score
0.021
Published
2002-10-28
Unknown vulnerability in the WebSecure (DFSWeb) configuration utilities in AIX 4.x, possibly related to relative pathnames.
CVSS Score
5.0
EPSS Score
0.005
Published
2002-10-04
Unknown vulnerability in DCE (1) SMIT panels and (2) configuration commands, possibly related to relative pathnames.
CVSS Score
5.0
EPSS Score
0.006
Published
2002-10-04
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
CVSS Score
10.0
EPSS Score
0.709
Published
2002-09-05
Buffer overflow in pioout on AIX 4.3.3.
CVSS Score
10.0
EPSS Score
0.013
Published
2002-08-12


Contact Us

Shodan ® - All rights reserved