Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.2.0
Ibm Aix 5.3
Ibm Aix 5.3.9
Ibm Aix 6.1.2
Ibm Aix 6.1.1
Ibm Vios 1.5.1
Ibm Vios 1.5.0
Ibm Aix 5
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 Ml03
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.1l
Ibm Aix 5.1.0.10
Ibm Aix 5.3.0
Ibm Aix 5.3 L
Ibm Aix 5.3.0.20
Ibm Aix 5.3.10
Ibm Vios
1 EDB exploit
10
CVSSv2
CVE-2006-5008
Unspecified vulnerability in utape in IBM AIX 5.2.0 and 5.3.0 allows malicious users to execute arbitrary commands and overwrite arbitrary files via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
9.3
CVSSv2
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 up to and including 5.3.10, and 6.1.0 up to and including 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote maliciou...
Ibm Aix 5.2
Ibm Aix 5.3.0
Ibm Aix 5.3.8
Ibm Aix 6.1.1
Ibm Aix 5.3.9
Ibm Aix 5.3.10
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3.7
Ibm Aix 6.1.2
1 EDB exploit
7.2
CVSSv2
CVE-2009-0370
Multiple unspecified vulnerabilities in IBM AIX 5.2.0 up to and including 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."
Ibm Aix 5.2
Ibm Aix 5.3.9
Ibm Aix 6.1
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.3.7
Ibm Aix 5.3.8
7.2
CVSSv2
CVE-2008-4018
swcons in bos.rte.console in IBM AIX 5.2.0 up to and including 6.1.1 allows local users in the system group to create or overwrite an arbitrary file, and establish weak permissions and root ownership for this file, via unspecified vectors. NOTE: this can be leveraged to gain priv...
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.2
CVSSv2
CVE-2007-6717
Buffer overflow in tftp in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to gain privileges via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
7.2
CVSSv2
CVE-2007-3680
Stack-based buffer overflow in the odm_searchpath function in libodm in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary code via a long ODMPATH environment variable.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
7.2
CVSSv2
CVE-2006-5003
Unspecified vulnerability in the named8 command in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary commands via unspecified vectors.
Ibm Aix 5.3.0
Ibm Aix 5.2.0
7.2
CVSSv2
CVE-2006-5005
Unspecified vulnerability in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary commands via unspecified vectors involving /etc/slip.login.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »