Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Ibm:
>> Aix
Security Vulnerabilities
CVE-1999-0023
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
CVSS Score
7.2
EPSS Score
0.007
Published
1996-07-24
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
CVSS Score
7.8
EPSS Score
0.003
Published
1996-07-03
CVE-1999-0138
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-06-26
CVE-1999-0019
Delete or create a file via rpc.statd, due to invalid information.
CVSS Score
5.0
EPSS Score
0.011
Published
1996-04-24
CVE-1999-0078
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
CVSS Score
1.9
EPSS Score
0.001
Published
1996-04-18
CVE-1999-0208
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
CVSS Score
10.0
EPSS Score
0.449
Published
1995-12-12
CVE-1999-0099
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
CVSS Score
10.0
EPSS Score
0.014
Published
1995-10-19
CVE-1999-1552
dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
1994-07-20
CVE-1999-0337
AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled.
CVSS Score
7.5
EPSS Score
0.008
Published
1994-06-03
CVE-1999-0113
Some implementations of rlogin allow root access if given a -froot parameter.
CVSS Score
10.0
EPSS Score
0.187
Published
1994-05-23
Prev
Next
Page 79
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved