Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Ibm:
>> Aix
Security Vulnerabilities
CVE-2000-1216
Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.
CVSS Score
7.2
EPSS Score
0.005
Published
2000-01-27
CVE-2000-0080
AIX techlibss allows local users to overwrite files via a symlink attack.
CVSS Score
2.1
EPSS Score
0.001
Published
2000-01-10
CVE-1999-1117
lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
CVSS Score
2.1
EPSS Score
0.004
Published
1999-12-31
CVE-1999-1589
Unspecified vulnerability in crontab in IBM AIX 3.2 allows local users to gain root privileges via unknown attack vectors.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-12-31
CVE-1999-0835
Denial of service in BIND named via malformed SIG records.
CVSS Score
10.0
EPSS Score
0.006
Published
1999-11-10
CVE-1999-0851
Denial of service in BIND named via naptr.
CVSS Score
2.1
EPSS Score
0.001
Published
1999-11-10
CVE-1999-0903
genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.
CVSS Score
7.5
EPSS Score
0.005
Published
1999-10-26
CVE-1999-1583
Buffer overflow in nslookup for AIX 4.3 allows local users to execute arbitrary code via a long hostname command line argument.
CVSS Score
7.2
EPSS Score
0.004
Published
1999-09-30
CVE-1999-0789
Buffer overflow in AIX ftpd in the libc library.
CVSS Score
10.0
EPSS Score
0.316
Published
1999-09-28
CVE-1999-1013
named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-09-23
Prev
Next
Page 72
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved