Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.3 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2005-0263
Buffer overflow in netpmon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -O argument.
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.1
1 EDB exploit
7.2
CVSSv2
CVE-2004-1028
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
7.2
CVSSv2
CVE-2004-1054
Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by i...
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
2 EDB exploits
7.2
CVSSv2
CVE-2004-1330
Buffer overflow in paginit in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary code via a long username.
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
1 EDB exploit
7.2
CVSSv2
CVE-2004-1329
Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 up to and including 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dc...
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 5.1l
Ibm Aix 5.1
1 EDB exploit
7.2
CVSSv2
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.0
Sgi Irix 6.5.9
Sgi Irix 6.4
Caldera Unixware 7.1.0
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
7.2
CVSSv2
CVE-1999-0055
Buffer overflows in Sun libnsl allow root access.
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Ibm Aix 4.2.1
Sun Solaris 2.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.2
Sun Sunos 5.5
Sun Sunos 5.4
Sun Sunos 5.5.1
Ibm Aix 4.3.1
Sun Solaris 2.6
Sun Sunos 5.2
Sun Sunos -
7.2
CVSSv2
CVE-1999-0033
Command execution in Sun systems via buffer overflow in the at program.
Ncr Mp-ras 3.0
Sgi Irix
Sco Openserver 5.0
Sun Sunos 5.5
Sco Open Desktop 3.0
Sun Sunos 5.3
Ibm Aix
Sco Openserver 3.0
Sco Unixware 3.2v4
Sun Sunos 5.4
Sco Unixware 2.1
Sun Sunos 5.5.1
7.2
CVSSv2
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Sgi Irix 5.3
Sgi Irix 4.0
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 5.3
Hp Hp-ux 10.30
Nec Ews-ux V 4.2mp
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.2
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
5 EDB exploits
7.2
CVSSv2
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.0
Sgi Irix 6.3
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »