Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 5.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0899
ftpd in IBM AIX 7.1.1 before SP10 and 7.1.2 before SP5, when a Workload Partition (aka WPAR) for AIX 5.2 or 5.3 is used, allows remote authenticated users to bypass intended permission settings and modify arbitrary files via FTP commands.
Ibm Aix 7.1.1
Ibm Aix 7.1.2
NA
CVE-2008-7288
IBM Tivoli Directory Server (TDS) 5.2 prior to 5.2.0.5-TIV-ITDS-LA0007 on AIX allows remote malicious users to cause a denial of service (server destabilization) via an anonymous DIGEST-MD5 LDAP Bind operation.
Ibm Tivoli Directory Server 5.2.0
Ibm Tivoli Directory Server 5.2.0.4
NA
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
NA
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.1
Ibm Aix 5.2
Ibm Aix 5.2.0
Ibm Aix 5.3
Ibm Aix 5.3.9
Ibm Aix 6.1.2
Ibm Aix 6.1.1
Ibm Vios 1.5.1
Ibm Vios 1.5.0
Ibm Aix 5
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3 Ml03
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.1l
Ibm Aix 5.1.0.10
Ibm Aix 5.3.0
Ibm Aix 5.3 L
Ibm Aix 5.3.0.20
Ibm Aix 5.3.10
Ibm Vios
1 EDB exploit
NA
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 up to and including 5.3.10, and 6.1.0 up to and including 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote maliciou...
Ibm Aix 5.2
Ibm Aix 5.3.0
Ibm Aix 5.3.8
Ibm Aix 6.1.1
Ibm Aix 5.3.9
Ibm Aix 5.3.10
Ibm Aix 6.1
Ibm Aix 6.1.0
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 5.2.2
Ibm Aix 5.2 L
Ibm Aix 5.3
Ibm Aix 5.3.7
Ibm Aix 6.1.2
1 EDB exploit
NA
CVE-2009-1355
Stack-based buffer overflow in muxatmd in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via a long filename.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
NA
CVE-2009-0370
Multiple unspecified vulnerabilities in IBM AIX 5.2.0 up to and including 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."
Ibm Aix 5.2
Ibm Aix 5.3.9
Ibm Aix 6.1
Ibm Aix 5.2 L
Ibm Aix 5.2.2
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 5.3
Ibm Aix 5.3 L
Ibm Aix 5.3.7
Ibm Aix 5.3.8
NA
CVE-2008-4018
swcons in bos.rte.console in IBM AIX 5.2.0 up to and including 6.1.1 allows local users in the system group to create or overwrite an arbitrary file, and establish weak permissions and root ownership for this file, via unspecified vectors. NOTE: this can be leveraged to gain priv...
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
NA
CVE-2008-2515
Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error."
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
NA
CVE-2008-2513
Buffer overflow in the kernel in IBM AIX 5.2, 5.3, and 6.1 allows local users to execute arbitrary code in kernel mode via unknown attack vectors.
Ibm Aix 5.2
Ibm Aix 5.3
Ibm Aix 6.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »