Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-3187
Buffer overflow in ftpd in IBM AIX 5.3 and previous versions allows remote malicious users to execute arbitrary code via a long NLST command.
Ibm Aix
2 EDB exploits
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.2.0
Ibm Aix 5.3
Ibm Aix 5.3.9
Ibm Aix 6.1.2
Ibm Aix 6.1.1
Ibm Vios 1.5.1
Ibm Vios 1.5.0
Ibm Aix 5
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 Ml03
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.1l
Ibm Aix 5.1.0.10
Ibm Aix 5.3.0
Ibm Aix 5.3 L
Ibm Aix 5.3.0.20
Ibm Aix 5.3.10
Ibm Vios
1 EDB exploit
10
CVSSv2
CVE-2009-3517
nfs.ext in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly use the nfs_portmon setting, which allows remote malicious users to bypass intended access restrictions for NFSv4 shares via unspecified vectors.
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3.8
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.3.7
Ibm Aix 5.3.0
10
CVSSv2
CVE-2005-4272
Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote malicious users to execute arbitrary code via (1) muxatmd and (2) slocal.
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.1
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 4.9
Isc Bind 8
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Sco Unixware 2.1
Sco Unixware 7.0
Sun Sunos 5.3
Sun Sunos 5.4
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Redhat Linux 4.2
Ibm Aix 4.2
Nec Asl Ux 4800 11
Redhat Linux 5.0
Sco Openserver 5.0
Sun Sunos 5.5.1
Ibm Aix 4.1
Ibm Aix 4.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »