Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-1028
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
7.2
CVSSv2
CVE-2004-1330
Buffer overflow in paginit in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary code via a long username.
Ibm Aix 5.3 L
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2.2
1 EDB exploit
7.2
CVSSv2
CVE-2004-1329
Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dc...
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.1
Ibm Aix 5.1l
Ibm Aix 5.3 L
1 EDB exploit
4.6
CVSSv2
CVE-2006-0674
Buffer overflow in the arp command of IBM AIX 5.3 L, 5.3, 5.2.2, 5.2 L, and 5.2 allows local users to cause a denial of service (crash) via a long iftype argument.
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3 L
3.3
CVSSv2
CVE-2006-1247
rm_mlcache_file in bos.rte.install in AIX 5.1.0 up to and including 5.3.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3.0.10
Ibm Aix 5.3.0.20
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.3.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.3 L
Ibm Aix 5.3 Ml03
Ibm Aix 5.2.2
Ibm Aix 5.2 L
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2