Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2005-0263
Buffer overflow in netpmon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -O argument.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.1
1 EDB exploit
7.5
CVSSv2
CVE-2003-0119
The secldapclntd daemon in AIX 4.3, 5.1 and 5.2 uses an Internet socket when communicating with the loadmodule, which allows remote malicious users to directly connect to the daemon and conduct unauthorized activities.
Ibm Aix 4.3.3
Ibm Aix 5.1
Ibm Aix 5.2
4.6
CVSSv2
CVE-2005-2232
Buffer overflow in invscout in IBM AIX 5.1.0 up to and including 5.3.0 might allow local users to execute arbitrary code via a long command line argument.
Ibm Aix 5.3
Ibm Aix 5.1
Ibm Aix 5.2
1 EDB exploit
2.1
CVSSv2
CVE-2005-2238
ftpd in IBM AIX 5.1, 5.2 and 5.3 allows remote authenticated users to cause a denial of service (port exhaustion and memory consumption) by using all ephemeral ports.
Ibm Aix 5.3
Ibm Aix 5.1
Ibm Aix 5.2
7.2
CVSSv2
CVE-2005-4068
Unspecified "absolute path vulnerability" in umountall in IBM AIX 5.1 up to and including 5.3 allows local users to cause unknown impact via unknown vectors.
Ibm Aix 5.3
Ibm Aix 5.1
Ibm Aix 5.2
6.9
CVSSv2
CVE-2004-2697
The Inventory Scout daemon (invscoutd) 1.3.0.0 and 2.0.2 for AIX 4.3.3 and 5.1 allows local users to gain privileges via a symlink attack on a command line argument (log file). NOTE: this might be related to CVE-2006-5002.
Ibm Aix 5.1l
Ibm Aix 4.3.3
Ibm Aix 5.1
1 EDB exploit
10
CVSSv2
CVE-2002-1621
Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote malicious users to execute arbitrary code.
Ibm Aix 4.3.1
Ibm Aix 4.3.3
Ibm Aix 5.1
Ibm Aix 4.3
Ibm Aix 4.3.2
7.2
CVSSv2
CVE-2003-0257
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 4.3.2
Ibm Aix 4.3.3
7.5
CVSSv2
CVE-2005-3396
Buffer overflow in the chcons (chcon) command in IBM AIX 5.2 and 5.3, when DEBUG MALLOC is enabled, might allow malicious users to execute arbitrary code via a long command line argument.
Ibm Aix 5.1
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
7.2
CVSSv2
CVE-2004-1028
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »