Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2235
Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
NA
CVE-2004-1028
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
NA
CVE-2004-1054
Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by i...
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
2 EDB exploits
NA
CVE-2004-1330
Buffer overflow in paginit in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary code via a long username.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
1 EDB exploit
NA
CVE-2004-1329
Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dc...
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2