Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-3187
Buffer overflow in ftpd in IBM AIX 5.3 and previous versions allows remote malicious users to execute arbitrary code via a long NLST command.
Ibm Aix
2 EDB exploits
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs/oncplus
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4
Ibm Aix 5.2.0.50
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2.1.12
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 1.2.1
Ibm Aix 4.3.0
Ibm Aix 430
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 3.2.0
Ibm Aix 4.0
1 EDB exploit
10
CVSSv2
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.2.0.50
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 5.3.0.20
Ibm Aix 5.3 L
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.3.10
Ibm Aix 5.3
Ibm Aix 5
Ibm Aix 6.1.0
Ibm Vios
Ibm Aix 5.2
Ibm Aix 6.1.1
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 5.3 Ml03
Ibm Aix 5.3.9
Ibm Vios 1.5.2
Ibm Vios 1.4
Ibm Aix 5.2.0
1 EDB exploit
10
CVSSv2
CVE-2009-3517
nfs.ext in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly use the nfs_portmon setting, which allows remote malicious users to bypass intended access restrictions for NFSv4 shares via unspecified vectors.
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 6.1.0
Ibm Aix 6.1.1
Ibm Aix 6.1
Ibm Aix 6.1.2
Ibm Aix 5.3.0
10
CVSSv2
CVE-2005-4272
Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote malicious users to execute arbitrary code via (1) muxatmd and (2) slocal.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.3.2
Sgi Irix 3.3.1
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.2
Ibm Aix 4.3.2
Sco Openserver 5.0
Ibm Aix 4.3
Sun Sunos 5.3
Hp Hp-ux 11.11
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Sco Openserver 5.0.2
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.8
Sco Openserver 5.0.5
Hp Hp-ux 11.00
Hp Hp-ux 11.0.4
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Isc Bind 8.1
Sgi Irix 5.3
Data General Dg Ux 5.4 3.0
Sgi Irix 4.0.5 Iop
Data General Dg Ux 5.4 3.1
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Sgi Irix 3.3.1
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Isc Bind 4.9.6
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Data General Dg Ux 5.4 4.11
2 EDB exploits
10
CVSSv2
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu03
Data General Dg Ux Y2k Patchr4.12mu03
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 8
Data General Dg Ux Y2k Patchr4.20mu01
Sco Openserver 5.0
Nec Asl Ux 4800 11
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Netbsd Netbsd 1.3
Ibm Aix 4.2
Netbsd Netbsd 1.3.1
Redhat Linux 5.0
Sun Sunos 5.5
Sco Unixware 2.1
Sco Unix 3.2v4
Sun Sunos 5.4
Sco Unixware 7.0
Sun Sunos 5.5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »