Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-3187
Buffer overflow in ftpd in IBM AIX 5.3 and previous versions allows remote malicious users to execute arbitrary code via a long NLST command.
Ibm Aix
2 EDB exploits
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.2.0
Ibm Aix 5.3
Ibm Aix 5.3.9
Ibm Aix 6.1.2
Ibm Aix 6.1.1
Ibm Vios 1.5.1
Ibm Vios 1.5.0
Ibm Aix 5
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 Ml03
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.1l
Ibm Aix 5.1.0.10
Ibm Aix 5.3.0
Ibm Aix 5.3 L
Ibm Aix 5.3.0.20
Ibm Aix 5.3.10
Ibm Vios
1 EDB exploit
10
CVSSv2
CVE-2009-3517
nfs.ext in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly use the nfs_portmon setting, which allows remote malicious users to bypass intended access restrictions for NFSv4 shares via unspecified vectors.
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3.8
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.3.7
Ibm Aix 5.3.0
10
CVSSv2
CVE-2006-5008
Unspecified vulnerability in utape in IBM AIX 5.2.0 and 5.3.0 allows malicious users to execute arbitrary commands and overwrite arbitrary files via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
10
CVSSv2
CVE-2005-4272
Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote malicious users to execute arbitrary code via (1) muxatmd and (2) slocal.
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.1
10
CVSSv2
CVE-2005-1037
Unknown vulnerability in AIX 5.3.0, when configured as an NIS client, allows remote malicious users to gain root privileges.
Ibm Aix 5.3.0
10
CVSSv2
CVE-2004-1152
Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote malicious users to execute arbitrary code via an e-mail message with a crafted PDF attachment.
Adobe Acrobat Reader 5.0.9
10
CVSSv2
CVE-2004-2388
rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user.
Ibm Aix 4.3.3
10
CVSSv2
CVE-2004-0368
Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote malicious users to execute arbitrary code via a crafted XDMCP packet.
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 1.0.1
Xi Graphics Dextop 2.1
Xi Graphics Dextop 3.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 2.1.20
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
Ibm Aix 5.2
Ibm Aix 4.3.3
Ibm Aix 5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »