CVE-1999-0903
- EPSS 0.49%
- Published 26.10.1999 04:00:00
- Last modified 03.04.2025 01:03:51
genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.
CVE-1999-1583
- EPSS 0.1%
- Published 30.09.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in nslookup for AIX 4.3 allows local users to execute arbitrary code via a long hostname command line argument.
- EPSS 31.59%
- Published 28.09.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in AIX ftpd in the libc library.
CVE-1999-1013
- EPSS 0.06%
- Published 23.09.1999 04:00:00
- Last modified 03.04.2025 01:03:51
named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
CVE-1999-0687
- EPSS 7.3%
- Published 13.09.1999 04:00:00
- Last modified 03.04.2025 01:03:51
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
CVE-1999-0691
- EPSS 0.37%
- Published 13.09.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
- EPSS 25.84%
- Published 18.08.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
CVE-1999-0694
- EPSS 0.06%
- Published 11.08.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Denial of service in AIX ptrace system call allows local users to crash the system.
CVE-1999-1079
- EPSS 0.07%
- Published 06.05.1999 04:00:00
- Last modified 03.04.2025 01:03:51
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
- EPSS 7.48%
- Published 17.02.1999 05:00:00
- Last modified 03.04.2025 01:03:51
snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /t...