Vulnerabilities > IBM > AIX > Critical

DATE CVE VULNERABILITY TITLE RISK
2002-09-05 CVE-2002-0679 Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
network
low complexity
caldera xi-graphics compaq hp ibm sun
critical
10.0
2002-08-12 CVE-2002-0742 Remote Security vulnerability in IBM AIX 4.3.3
Buffer overflow in pioout on AIX 4.3.3.
network
low complexity
ibm
critical
10.0
2002-08-12 CVE-2002-0743 Remote Security vulnerability in IBM AIX 4.3.3
mail and mailx in AIX 4.3.3 core dump when called with a very long argument, an indication of a buffer overflow.
network
low complexity
ibm
critical
10.0
2002-08-12 CVE-2002-0744 Remote Security vulnerability in IBM AIX 4.3.3
namerslv in AIX 4.3.3 core dumps when called with a very long argument, possibly as a result of a buffer overflow.
network
low complexity
ibm
critical
10.0
2002-08-12 CVE-2002-0745 Remote Security vulnerability in IBM AIX 4.3.3
Buffer overflow in uucp in AIX 4.3.3.
network
low complexity
ibm
critical
10.0
2002-08-12 CVE-2002-0746 Remote Security vulnerability in IBM AIX 4.3.3
Vulnerability in template.dhcpo in AIX 4.3.3 related to an insecure linker argument.
network
low complexity
ibm
critical
10.0
2002-08-12 CVE-2002-0747 Remote Security vulnerability in IBM AIX 4.3.3
Buffer overflow in lsmcode in AIX 4.3.3.
network
low complexity
ibm
critical
10.0
2002-04-22 CVE-2002-1621 Remote Security vulnerability in AIX
Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote attackers to execute arbitrary code.
network
low complexity
ibm
critical
10.0
2001-12-21 CVE-2001-1440 Authentication Module Unauthorized Access vulnerability in IBM AIX 5.1L
Unknown vulnerability in login for AIX 5.1L, when using loadable authentication modules, allows remote attackers to gain access to the system.
network
low complexity
ibm
critical
10.0
2001-12-12 CVE-2001-0797 Buffer Overflow vulnerability in Multiple Vendor System V Derived 'login'
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
network
low complexity
sgi hp ibm sco sun
critical
10.0