Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2005-2235
Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments.
Ibm Aix 5.1
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3 L
7.2
CVSSv2
CVE-2004-1054
Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by i...
Ibm Aix 5.1
Ibm Aix 5.3 L
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
2 EDB exploits
7.5
CVSSv2
CVE-2005-3396
Buffer overflow in the chcons (chcon) command in IBM AIX 5.2 and 5.3, when DEBUG MALLOC is enabled, might allow malicious users to execute arbitrary code via a long command line argument.
Ibm Aix 5.1
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.2.2
Ibm Aix 5.2 L
7.2
CVSSv2
CVE-2005-2233
Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare.
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 L
7.2
CVSSv2
CVE-2009-0370
Multiple unspecified vulnerabilities in IBM AIX 5.2.0 up to and including 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."
Ibm Aix 5.2
Ibm Aix 5.3.9
Ibm Aix 6.1
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.3.7
Ibm Aix 5.3.8
3.3
CVSSv2
CVE-2006-1247
rm_mlcache_file in bos.rte.install in AIX 5.1.0 up to and including 5.3.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 5.3.0.10
Ibm Aix 5.3.0.20
Ibm Aix 5.1
Ibm Aix 5.3
Ibm Aix 5.3.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.3 L
Ibm Aix 5.3 Ml03
Ibm Aix 5.2.2
Ibm Aix 5.2 L
7.2
CVSSv2
CVE-2005-0240
Format string vulnerability in chdev on IBM AIX 5.2 allows local users to execute arbitrary code via format string specifiers in a command line argument, which is not properly handled when printing an error message.
Ibm Aix 5.2
7.2
CVSSv2
CVE-2007-4622
Integer underflow in the dns_name_fromtext function in (1) libdns_nonsecure.a and (2) libdns_secure.a in IBM AIX 5.2 allows local users to gain privileges via a crafted "-y" (TSIG key) command line argument to dig.
Ibm Aix 5.2
7.2
CVSSv2
CVE-2007-4621
Buffer overflow in crontab in IBM AIX 5.2 allows local users to gain privileges via long command line arguments.
Ibm Aix 5.2
10
CVSSv2
CVE-2003-0170
Unknown vulnerability in ftpd in IBM AIX 5.2, when configured to use Kerberos 5 for authentication, allows remote malicious users to gain privileges via unknown attack vectors.
Ibm Aix 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »