Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2008-1601
Stack-based buffer overflow in the reboot program on IBM AIX 5.2 and 5.3 allows local users in the shutdown group to gain privileges.
Ibm Aix 5.3
Ibm Aix 5.2
614
VMScore
CVE-2007-5804
cfgcon in IBM AIX 5.2 and 5.3 does not properly validate the argument to the "-p" option to swcons, which allows local users in the system group to create or overwrite an arbitrary file, and enable world writability of this file, by using the file's name as the arg...
Ibm Aix 5.2
Ibm Aix 5.3
641
VMScore
CVE-2004-0545
LVM for AIX 5.1 and 5.2 allows local users to overwrite arbitrary files via a symlink attack.
Ibm Aix 5.1
Ibm Aix 5.2
641
VMScore
CVE-2006-4522
Unspecified vulnerability in dtterm in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code with root privileges via unspecified vectors.
Ibm Aix 5.2
Ibm Aix 5.3
614
VMScore
CVE-2007-5805
cfgcon in IBM AIX 5.2 and 5.3 does not properly validate the argument to the "-p" option to swcons, which allows local users in the system group to create an arbitrary file, and enable world writability of this file, via a symlink attack involving use of the file's...
Ibm Aix 5.3
Ibm Aix 5.2
187
VMScore
CVE-2004-0828
The ctstrtcasd program in RSCT 2.3.0.0 and previous versions on IBM AIX 5.2 and 5.3 does not properly drop privileges before executing the -f option, which allows local users to modify or create arbitrary files.
Ibm Aix 5.3
Ibm Aix 5.2
641
VMScore
CVE-2003-0257
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 4.3.2
Ibm Aix 4.3.3
641
VMScore
CVE-2004-1028
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
668
VMScore
CVE-2005-3396
Buffer overflow in the chcons (chcon) command in IBM AIX 5.2 and 5.3, when DEBUG MALLOC is enabled, might allow malicious users to execute arbitrary code via a long command line argument.
Ibm Aix 5.1
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
641
VMScore
CVE-2005-2233
Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare.
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 L
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »