Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.3 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2008-2513
Buffer overflow in the kernel in IBM AIX 5.2, 5.3, and 6.1 allows local users to execute arbitrary code in kernel mode via unknown attack vectors.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.2
CVSSv2
CVE-2008-1596
Trusted Execution in IBM AIX 6.1 uses an incorrect pathname argument in a call to the trustchk_block_write function, which might allow local users to modify trusted files, related to missing checks in the TSD_FILES_LOCK policy for modifications performed via hard links, a differe...
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.2
CVSSv2
CVE-2008-1600
The lsmcode program on IBM AIX 5.2, 5.3, and 6.1 does not properly handle environment variables, which allows local users to gain privileges, a different vulnerability than CVE-2004-1329.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.1
CVSSv2
CVE-2012-0194
The TCP implementation in IBM AIX 5.3, 6.1, and 7.1, when the Large Send Offload option is enabled, allows remote malicious users to cause a denial of service (assertion failure and panic) via an unspecified series of packets.
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
7.2
CVSSv2
CVE-2008-1593
The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably rela...
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.2
CVSSv2
CVE-2008-1599
The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
7.2
CVSSv2
CVE-2008-4018
swcons in bos.rte.console in IBM AIX 5.2.0 up to and including 6.1.1 allows local users in the system group to create or overwrite an arbitrary file, and establish weak permissions and root ownership for this file, via unspecified vectors. NOTE: this can be leveraged to gain priv...
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
4.6
CVSSv2
CVE-2005-2232
Buffer overflow in invscout in IBM AIX 5.1.0 up to and including 5.3.0 might allow local users to execute arbitrary code via a long command line argument.
Ibm Aix 5.3
Ibm Aix 5.1
Ibm Aix 5.2
1 EDB exploit
7.2
CVSSv2
CVE-2005-0262
Buffer overflow in ipl_varyon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -d argument.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.1
1 EDB exploit
7.2
CVSSv2
CVE-2005-0250
Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument.
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »