Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 up to and including 5.3.10, and 6.1.0 up to and including 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote maliciou...
Ibm Aix 5.2
Ibm Aix 5.3.0
Ibm Aix 5.3.8
Ibm Aix 6.1.1
Ibm Aix 5.3.9
Ibm Aix 5.3.10
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3.7
Ibm Aix 6.1.2
1 EDB exploit
890
VMScore
CVE-2009-3517
nfs.ext in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly use the nfs_portmon setting, which allows remote malicious users to bypass intended access restrictions for NFSv4 shares via unspecified vectors.
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3.8
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.3.7
Ibm Aix 5.3.0
890
VMScore
CVE-2006-5008
Unspecified vulnerability in utape in IBM AIX 5.2.0 and 5.3.0 allows malicious users to execute arbitrary commands and overwrite arbitrary files via unspecified vectors.
Ibm Aix 5.2.0
Ibm Aix 5.3.0
890
VMScore
CVE-2005-4272
Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote malicious users to execute arbitrary code via (1) muxatmd and (2) slocal.
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.1
890
VMScore
CVE-2005-1037
Unknown vulnerability in AIX 5.3.0, when configured as an NIS client, allows remote malicious users to gain root privileges.
Ibm Aix 5.3.0
890
VMScore
CVE-2004-1152
Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote malicious users to execute arbitrary code via an e-mail message with a crafted PDF attachment.
Adobe Acrobat Reader 5.0.9
890
VMScore
CVE-2004-2388
rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user.
Ibm Aix 4.3.3
890
VMScore
CVE-2004-0368
Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote malicious users to execute arbitrary code via a crafted XDMCP packet.
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 1.0.1
Xi Graphics Dextop 2.1
Xi Graphics Dextop 3.0
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 2.1.20
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 1.1
Ibm Aix 5.2
Ibm Aix 4.3.3
Ibm Aix 5.1
890
VMScore
CVE-2003-0170
Unknown vulnerability in ftpd in IBM AIX 5.2, when configured to use Kerberos 5 for authentication, allows remote malicious users to gain privileges via unknown attack vectors.
Ibm Aix 5.2
890
VMScore
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »