Filtered by vendor Ibm Subscriptions
Filtered by product Aix Subscriptions
Total 796 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0693 3 Hp, Ibm, Sco 3 Hp-ux, Aix, Unixware 2025-04-03 N/A
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
CVE-2001-1440 1 Ibm 1 Aix 2025-04-03 N/A
Unknown vulnerability in login for AIX 5.1L, when using loadable authentication modules, allows remote attackers to gain access to the system.
CVE-2001-1529 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflow in rpc.yppasswdd (yppasswd server) in AIX allows attackers to gain unauthorized access via a long string. NOTE: due to lack of details in the vendor advisory, it is not clear if this is the same issue as CVE-2001-0779.
CVE-2005-0156 7 Ibm, Larry Wall, Redhat and 4 more 9 Aix, Perl, Enterprise Linux and 6 more 2025-04-03 N/A
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
CVE-1999-0745 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
CVE-2006-0667 1 Ibm 1 Aix 2025-04-03 N/A
lscfg in IBM AIX 5.2 and 5.3 allows local users to modify arbitrary files via a symlink attack.
CVE-2001-1330 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflow in rsh on AIX 4.2.0.0 may allow local users to gain root privileges via a long command line argument.
CVE-1999-0087 1 Ibm 1 Aix 2025-04-03 N/A
Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
CVE-2002-1468 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflow in errpt in AIX 4.3.3 allows local users to execute arbitrary code as root.
CVE-2000-0249 1 Ibm 1 Aix 2025-04-03 N/A
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
CVE-2006-0666 1 Ibm 1 Aix 2025-04-03 N/A
Unspecified vulnerability in the (1) unix_mp and (2) unix_64 kernels in IBM AIX 5.3 VRMF 5.3.0.30 through 5.3.0.33 allows local users to cause a denial of service (system crash) via unknown vectors related to EMULATE_VMX.
CVE-2002-0790 1 Ibm 1 Aix 2025-04-03 N/A
clchkspuser and clpasswdremote in AIX expose an encrypted password in the cspoc.log file, which could allow local users to gain privileges.
CVE-2001-1096 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflows in muxatmd in AIX 4 allows an attacker to cause a core dump and possibly execute code.
CVE-2005-4273 1 Ibm 1 Aix 2025-04-03 N/A
Multiple unspecified vulnerabilities in (1) getShell and (2) getCommand in IBM AIX 5.3 allow local users to append to arbitrary files.
CVE-2003-0784 1 Ibm 1 Aix 2025-04-03 N/A
Format string vulnerability in tsm for the bos.rte.security fileset on AIX 5.2 allows remote attackers to gain root privileges via login, and local users to gain privileges via login, su, or passwd, with a username that contains format string specifiers.
CVE-2001-0797 5 Hp, Ibm, Sco and 2 more 6 Hp-ux, Aix, Openserver and 3 more 2025-04-03 N/A
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
CVE-1999-0055 2 Ibm, Sun 3 Aix, Solaris, Sunos 2025-04-03 N/A
Buffer overflows in Sun libnsl allow root access.
CVE-2005-2235 1 Ibm 1 Aix 2025-04-03 N/A
Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments.
CVE-2005-4272 1 Ibm 1 Aix 2025-04-03 N/A
Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote attackers to execute arbitrary code via (1) muxatmd and (2) slocal.
CVE-2001-1080 1 Ibm 1 Aix 2025-04-03 N/A
diagrpt in AIX 4.3.x and 5.1 uses the DIAGDATADIR environment variable to find and execute certain programs, which allows local users to gain privileges by modifying the variable to point to a Trojan horse program.