Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2.0 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2007-6717
Buffer overflow in tftp in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to gain privileges via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
695
VMScore
CVE-2007-4004
Buffer overflow in the ftp client in IBM AIX 5.3 SP6 and 5.2.0 allows local users to execute arbitrary code via unspecified vectors that trigger the overflow in a gets function call. NOTE: the client is setuid root on AIX, so this issue crosses privilege boundaries.
Ibm Aix 5.3
Ibm Aix 5.2.0
1 EDB exploit
445
VMScore
CVE-2006-6914
Unspecified vulnerability in ftpd in IBM AIX 5.2.0 and 5.3.0 allows remote malicious users to obtain sensitive information, including passwords, via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
383
VMScore
CVE-2007-2995
Unspecified vulnerability in sysmgt.websm.rte in IBM AIX 5.2.0 and 5.3.0 has unknown impact and attack vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3
356
VMScore
CVE-2006-6915
ftpd in IBM AIX 5.2.0 and 5.3.0 allows remote authenticated users to cause a denial of service (port exhaustion) via unspecified vectors. NOTE: some details were obtained from third party sources.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
436
VMScore
CVE-2009-0536
at in bos.rte.cron on IBM AIX 5.2.0, 5.3.0 up to and including 5.3.9, and 6.1.0 up to and including 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.
Ibm Aix 5.3.9
Ibm Aix 5.3.0
Ibm Aix 6.1.1
Ibm Aix 6.1.0
Ibm Aix 5.2.0
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 6.1.2
935
VMScore
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 up to and including 5.3.10, and 6.1.0 up to and including 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote maliciou...
Ibm Aix 5.2
Ibm Aix 5.3.0
Ibm Aix 5.3.8
Ibm Aix 6.1.1
Ibm Aix 5.3.9
Ibm Aix 5.3.10
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3.7
Ibm Aix 6.1.2
1 EDB exploit
1000
VMScore
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.2.0
Ibm Aix 5.3
Ibm Aix 5.3.9
Ibm Aix 6.1.2
Ibm Aix 6.1.1
Ibm Vios 1.5.1
Ibm Vios 1.5.0
Ibm Aix 5
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 Ml03
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.1l
Ibm Aix 5.1.0.10
Ibm Aix 5.3.0
Ibm Aix 5.3 L
Ibm Aix 5.3.0.20
Ibm Aix 5.3.10
Ibm Vios
1 EDB exploit
1000
VMScore
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
641
VMScore
CVE-2009-0370
Multiple unspecified vulnerabilities in IBM AIX 5.2.0 up to and including 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."
Ibm Aix 5.2
Ibm Aix 5.3.9
Ibm Aix 6.1
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.3.7
Ibm Aix 5.3.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »