This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Ibm First view 1992-03-01
Product Aix Last view 2018-06-22
Version 7.1 Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:* 108
cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:* 91
cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:* 69
cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:* 57
cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:* 53
cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:* 53
cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:* 47
cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:* 39
cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:* 37
cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:* 34
cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:* 27
cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:* 27
cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:* 26
cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:* 25
cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:* 25
cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:* 25
cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:* 24
cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:* 24
cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:* 24
cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:* 23
cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:* 23
cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:* 20
cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:* 17
cpe:2.3:o:ibm:aix:5.3_l:*:*:*:*:*:*:* 17
cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:* 16
cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:* 16
cpe:2.3:o:ibm:aix:5.1l:*:*:*:*:*:*:* 15
cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:* 15
cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:* 12
cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:* 12
cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:* 10
cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:* 9
cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:* 9
cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:* 8
cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:* 8
cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:* 8
cpe:2.3:o:ibm:aix:4.0:*:*:*:*:*:*:* 7
cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:* 7
cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:* 7
cpe:2.3:o:ibm:aix:*:*:32-bit:*:*:*:*:* 7
cpe:2.3:o:ibm:aix:3.2.0:*:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:4.2.0:*:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:5.3:sp6:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:*:*:~~~~x64~:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:*:*:~~~~x86~:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* 6
cpe:2.3:o:ibm:aix:-:*:*:*:*:*:x64:* 6
cpe:2.3:o:ibm:aix:4.3.0:*:*:*:*:*:*:* 5

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.5 2018-06-22 CVE-2018-1655

IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748.

9.1 2018-02-13 CVE-2018-1383

A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117.

7.8 2018-02-07 CVE-2017-1692

IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM X-Force ID: 134067.

7.3 2017-10-03 CVE-2017-1541

A flaw in the AIX 5.3, 6.1, 7.1, and 7.2 JRE/SDK installp and updatep packages prevented the java.security, java.policy and javaws.policy files from being updated correctly. IBM X-Force ID: 130809.

7.8 2017-02-15 CVE-2016-8972

IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011.

5.5 2017-02-15 CVE-2016-8944

IBM AIX 7.1 and 7.2 allows a local user to open a file with a specially crafted argument that would crash the system. IBM APARs: IV91488, IV91487, IV91456, IV90234.

7.8 2017-02-15 CVE-2016-6079

IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM APARs: IV88658, IV87981, IV88419, IV87640, IV88053.

7.8 2017-02-02 CVE-2017-1093

IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges.

7.8 2017-02-01 CVE-2016-3053

IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges.

6.5 2016-09-26 CVE-2016-6038

Directory traversal vulnerability in Eclipse Help in IBM Tivoli Lightweight Infrastructure (aka LWI), as used in AIX 5.3, 6.1, and 7.1, allows remote authenticated users to read arbitrary files via a crafted URL.

3.7 2016-08-07 CVE-2016-0281

The mustendd driver in IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x, when the jumbo_frames feature is not enabled, allows remote attackers to cause a denial of service (FC1763 or FC5899 adapter crash) via crafted packets.

3.7 2016-08-07 CVE-2016-0266

IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x do not default to the latest TLS version, which makes it easier for man-in-the-middle attackers to obtain sensitive information via unspecified vectors.

6.9 2015-10-15 CVE-2015-4948

netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

7.2 2015-02-21 CVE-2014-6184

Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors.

7.2 2015-01-15 CVE-2014-8904

lquerylv in cmdlvm in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x allows local users to gain privileges via a crafted DBGCMD_LQUERYLV environment-variable value.

3.4 2014-10-14 CVE-2014-3566

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

2.6 2014-08-26 CVE-2013-6335

The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and restore operations, which allows local users to bypass intended access restrictions via standard filesystem operations.

7.2 2014-07-02 CVE-2014-3074

The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.

6.9 2014-06-08 CVE-2014-3977

libodm.a in IBM AIX 6.1 and 7.1, and VIOS 2.2.x, allows local users to overwrite arbitrary files via a symlink attack on a temporary file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2179.

4.7 2014-05-08 CVE-2014-0930

The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.

6.5 2014-03-11 CVE-2014-0899

ftpd in IBM AIX 7.1.1 before SP10 and 7.1.2 before SP5, when a Workload Partition (aka WPAR) for AIX 5.2 or 5.3 is used, allows remote authenticated users to bypass intended permission settings and modify arbitrary files via FTP commands.

6.9 2013-10-04 CVE-2013-5419

Multiple buffer overflows in (1) mkque and (2) mkquedev in bos.rte.printers in IBM AIX 6.1 and 7.1 allow local users to gain privileges by leveraging printq group membership.

7.2 2013-07-18 CVE-2013-4011

Multiple unspecified vulnerabilities in the InfiniBand subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allow local users to gain privileges via vectors involving (1) arp.ib or (2) ibstat.

8.5 2013-07-06 CVE-2013-3005

The TFTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, when RBAC is enabled, allows remote authenticated users to bypass intended file-ownership restrictions, and read or overwrite arbitrary files, via unspecified vectors.

7.1 2013-06-21 CVE-2013-3035

The IPv6 implementation in the inet subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allows remote attackers to cause a denial of service (system hang) via a crafted packet to an IPv6 interface.

CWE : Common Weakness Enumeration

%idName
39% (39) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (33) CWE-264 Permissions, Privileges, and Access Controls
5% (5) CWE-20 Improper Input Validation
4% (4) CWE-399 Resource Management Errors
4% (4) CWE-200 Information Exposure
4% (4) CWE-59 Improper Link Resolution Before File Access ('Link Following')
2% (2) CWE-362 Race Condition
1% (1) CWE-352 Cross-Site Request Forgery (CSRF)
1% (1) CWE-310 Cryptographic Issues
1% (1) CWE-287 Improper Authentication
1% (1) CWE-255 Credentials Management
1% (1) CWE-254 Security Features
1% (1) CWE-189 Numeric Errors
1% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-42 MIME Conversion
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-67 String Format Overflow in syslog()
CAPEC-69 Target Programs with Elevated Privileges
CAPEC-88 OS Command Injection
CAPEC-92 Forced Integer Overflow
CAPEC-100 Overflow Buffers
CAPEC-104 Cross Zone Scripting
CAPEC-123 Buffer Attacks
CAPEC-133 Try All Common Application Switches and Options
CAPEC-219 XML Routing Detour Attacks

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:6051 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5833 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5966 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5931 The vacation program erroneously passes parameters to sendmail.
oval:org.mitre.oval:def:5571 ttsession uses weak RPC authentication mechanism
oval:org.mitre.oval:def:3078 CDE AddSuLog Function Buffer Overflow
oval:org.mitre.oval:def:4374 ToolTalk Buffer Overflow via TT_SESSION Envvar
oval:org.mitre.oval:def:1828 Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:2025 System V login Buffer Overflow
oval:org.mitre.oval:def:91 Solaris 7 CDE ToolTalk Database Null Write Vulnerability
oval:org.mitre.oval:def:15 Solaris 8 CDE ToolTalk Database Null Write Vulnerability
oval:org.mitre.oval:def:1099 Solaris 9 CDE ToolTalk Database Null Write Vulnerability
oval:org.mitre.oval:def:80 Solaris 7 CDE ToolTalk Database Symbolic Link Vulnerability
oval:org.mitre.oval:def:2770 Solaris 9 CDE ToolTalk Database Server Symbolic Link Vulnerability
oval:org.mitre.oval:def:175 Solaris 8 CDE ToolTalk Database Server Symbolic Link Vulnerability
oval:org.mitre.oval:def:192 Solaris 8 CDE ToolTalk Database Heap Corruption Vulnerability
oval:org.mitre.oval:def:177 Solaris 7 CDE ToolTalk Database Heap Corruption Vulnerability
oval:org.mitre.oval:def:230 xdrmem_bytes() Integer Overflow Vulnerability
oval:org.mitre.oval:def:595 Potential BO in Ruleset Parsing for Sendmail
oval:org.mitre.oval:def:3606 Sendmail Ruleset Parsing Buffer Overflow
oval:org.mitre.oval:def:603 Sendmail BO in prescan Function
oval:org.mitre.oval:def:572 Sendmail BO in Prescan Function
oval:org.mitre.oval:def:2975 Sendmail prescan function Buffer Overflow
oval:org.mitre.oval:def:2011 ISC BIND Cache Poison Denial Of Service
oval:org.mitre.oval:def:1436 Solaris CDE DTLogin XDMCP Parser Remote Double Free Vulnerability

SAINT Exploits

Description Link
rpc.ypupdated command injection vulnerability More info here
System V login argument array buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77689 IBM AIX Inventory Scout Unspecified Arbitrary File Deletion
77688 IBM AIX Inventory Scout Symlink Arbitrary File Manipulation
77161 IBM AIX Multiple System Call Parsing Local DoS
76075 IBM AIX QLogic Adapter DMA Resource Weakness Local DoS
73529 IBM Tivoli Directory Server on AIX Anonymous DIGEST-MD5 LDAP Bind Operation R...
72682 IBM AIX LDAP Authentication Bypass
70519 IBM AIX FC SCSI Protocol Driver Timer Deallocation Local DoS
68100 IBM AIX bos.esagent Fileset sa_snap Unspecified Local File Deletion
68099 IBM AIX bos.esagent Fileset sa_snap Local Overflow
67346 Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M...
66576 IBM AIX FTP NLST Command Crafted Parameter Core Dump Password Hash Remote Dis...
66254 IBM AIX printers.rte pioout Unspecified Command-Line Option Local Overflow
65829 Snare Agent Multiple Unspecified CSRF
63295 IBM AIX bos.rte.libc getaddrinfo Function Call Unspecified Address Field DoS
62908 IBM AIX bos.net.tcp.server qoslist Local Overflow
62907 IBM AIX bos.net.tcp.server qosmod Local Overflow
62750 IBM AIX secldapclntd LDAP Login Failure Unspecified DoS
61182 IBM AIX qoslist Argument Handling Overflow
61181 IBM AIX qosmod Argument Handling Overflow
60454 dtterm Window Title Escape Sequence Arbitrary Command Execution
59264 Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
58726 IBM AIX libcsa.a Calendar Manager Service Daemon (rpc.cmsd) Remote Procedure ...
58410 IBM AIX nfs.ext NFSv4 nfs_portmon Tunable Network Share Remote Access Restric...
58409 IBM AIX gssd NFSv4 Kerberos Credential Cache Network Share Local Access Restr...
56767 IBM AIX libC XL C++ Runtime Library Multiple Variable Arbitrary File Overwrit...

ExploitDB Exploits

id Description
33725 IBM AIX 6.1.8 libodm - Arbitrary File Write
28507 IBM AIX 6.1 / 7.1 - Local Root Privilege Escalation
22251 AIX 3.x/4.x,Windows 95/98/2000/NT 4,SunOS 5 gethostbyname() Buffer Overflow
21180 Solaris/SPARC 2.5.1/2.6/7/8 Derived 'login' Buffer Overflow Vulnerability
9645 IBM AIX 5.6/6.1 _LIB_INIT_DBG Arbitrary File Overwrite via Libc Debug
4612 IBM AIX <= 5.3.0 - setlocale() Local Privilege Escalation Exploit
716 Solaris 2.5.1/2.6/7/8 rlogin /bin/login - Buffer Overflow Exploit (SPARC)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-10-16 Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2011-11-15 Name : SendMail Mail Relay Vulnerability
File : nvt/gb_sendmail_mail_relay_vuln.nasl
2011-09-27 Name : CDE ToolTalk RPC Database Server Multiple Vulnerabilities
File : nvt/secpod_tooltalk_rpc_database_server_mult_vuln.nasl
2011-07-15 Name : ICMP Timestamp Detection
File : nvt/gb_icmp_timestamps.nasl
2009-10-10 Name : SLES9: Security update for Perl
File : nvt/sles9p5013510.nasl
2009-05-05 Name : HP-UX Update for sendmail HPSBUX00281
File : nvt/gb_hp_ux_HPSBUX00281.nasl
2009-05-05 Name : HP-UX Update for dtterm HPSBUX00309
File : nvt/gb_hp_ux_HPSBUX00309.nasl
2009-03-23 Name : Mail relaying
File : nvt/smtp_relay.nasl
2008-10-24 Name : rpc.ypupdated remote execution
File : nvt/ypupdated_remote_exec.nasl
2008-10-24 Name : SysV /bin/login buffer overflow (telnet)
File : nvt/binlogin_overflow_telnet.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200410-03 (netkit-telnetd)
File : nvt/glsa_200410_03.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200502-13 (Perl)
File : nvt/glsa_200502_13.nasl
2008-09-04 Name : FreeBSD Ports: bind
File : nvt/freebsd_bind.nasl
2008-09-04 Name : FreeBSD Ports: perl
File : nvt/freebsd_perl.nasl
2008-09-04 Name : FreeBSD Security Advisory (FreeBSD-SA-03:19.bind.asc)
File : nvt/freebsdsa_bind.nasl
2008-01-17 Name : Debian Security Advisory DSA 070-1 (netkit-telnet)
File : nvt/deb_070_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 272-1 (dietlibc)
File : nvt/deb_272_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 075-1 (netkit-telnet-ssl)
File : nvt/deb_075_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 266-1 (krb5)
File : nvt/deb_266_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 409-1 (bind)
File : nvt/deb_409_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 384-1 (sendmail)
File : nvt/deb_384_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 282-1 (glibc)
File : nvt/deb_282_1.nasl
2005-11-03 Name : Sendmail Local Starvation and Overflow
File : nvt/sendmail_875_bo.nasl
2005-11-03 Name : Sendmail 8.7.*/8.8.* local overflow
File : nvt/sendmail_daemon_mode.nasl
2005-11-03 Name : Sendmail Group Permissions Vulnerability
File : nvt/sendmail_forword_include.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0154 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0061081
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2013-B-0092 Multiple Vulnerabilities in IBM AIX
Severity: Category I - VMSKEY: V0040107

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10 RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10 Unix rlogin froot parameter root access attempt
RuleID : 604-community - Type : PROTOCOL-SERVICES - Revision : 14
2014-01-10 Unix rlogin froot parameter root access attempt
RuleID : 604 - Type : PROTOCOL-SERVICES - Revision : 14
2014-01-10 portmap ypupdated request TCP
RuleID : 591-community - Type : PROTOCOL-RPC - Revision : 21
2014-01-10 portmap ypupdated request TCP
RuleID : 591 - Type : PROTOCOL-RPC - Revision : 21
2014-01-10 portmap ttdbserv request UDP
RuleID : 588-community - Type : PROTOCOL-RPC - Revision : 27
2014-01-10 portmap ttdbserv request UDP
RuleID : 588 - Type : PROTOCOL-RPC - Revision : 27
2014-01-10 portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 DOS ttdbserv Solaris
RuleID : 572-community - Type : PROTOCOL-RPC - Revision : 14
2014-01-10 DOS ttdbserv Solaris
RuleID : 572 - Type : PROTOCOL-RPC - Revision : 14
2014-01-10 EXPLOIT ttdbserv Solaris overflow
RuleID : 571 - Type : RPC - Revision : 10
2014-01-10 EXPLOIT ttdbserv solaris overflow
RuleID : 570 - Type : RPC - Revision : 12
2016-09-29 XMDCP double-free attempt
RuleID : 39936 - Type : OS-SOLARIS - Revision : 2
2016-03-14 XMDCP double-free attempt
RuleID : 37511 - Type : OS-SOLARIS - Revision : 2
2014-01-10 PORT bounce attempt
RuleID : 3441-community - Type : PROTOCOL-FTP - Revision : 13
2014-01-10 PORT bounce attempt
RuleID : 3441 - Type : PROTOCOL-FTP - Revision : 13
2014-01-10 CEL overflow attempt
RuleID : 337-community - Type : PROTOCOL-FTP - Revision : 21
2014-01-10 CEL overflow attempt
RuleID : 337 - Type : PROTOCOL-FTP - Revision : 21
2014-01-10 login buffer non-evasive overflow attempt
RuleID : 3274-community - Type : PROTOCOL-TELNET - Revision : 14
2014-01-10 login buffer non-evasive overflow attempt
RuleID : 3274 - Type : PROTOCOL-TELNET - Revision : 14
2014-12-18 SSLv3 CBC client connection attempt
RuleID : 32566 - Type : POLICY-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-10 Name: An open SMTP relay is running on the host.
File: internal_smtp_relay_detection.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote AIX host has a version of bellmail installed that is affected by a...
File: aix_suid_advisory_bellmail.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote AIX host has a version of bos.acct installed that is affected by a...
File: aix_suid_advisory_bos_acct.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote AIX host has a version of lquerypv installed that is affected by a...
File: aix_suid_advisory_lquerypv.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote AIX host has a version of restbyinode installed that is affected b...
File: aix_suid_advisory_restbyinode.nasl - Type: ACT_GATHER_INFO
2018-06-28 Name: The remote AIX host has a version of the rmsock command installed that is aff...
File: aix_rmsock2_advisory.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02726.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02727.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02729.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02825.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02827.nasl - Type: ACT_GATHER_INFO
2018-02-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ02828.nasl - Type: ACT_GATHER_INFO
2017-12-07 Name: The remote host is potentially affected by an SSL/TLS vulnerability.
File: check_point_gaia_sk103683.nasl - Type: ACT_GATHER_INFO
2017-10-24 Name: The remote AIX host has a version of bind installed that is affected by multi...
File: aix_bind_nettcp_advisory2.nasl - Type: ACT_GATHER_INFO
2017-09-13 Name: The version of Java SDK installed on the remote AIX host is affected by multi...
File: aix_java_july2017_advisory.nasl - Type: ACT_GATHER_INFO
2017-08-03 Name: The remote AIX host has a version of bellmail installed that is affected by a...
File: aix_bellmail_advisory.nasl - Type: ACT_GATHER_INFO
2017-08-03 Name: The remote AIX host has a version of bellmail installed that is affected by a...
File: aix_bellmail_advisory2.nasl - Type: ACT_GATHER_INFO
2017-07-20 Name: The remote database server is affected by multiple vulnerabilities.
File: oracle_rdbms_cpu_jul_2017.nasl - Type: ACT_GATHER_INFO
2017-05-02 Name: The remote AIX host is missing a security patch.
File: aix_IV93624.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-459.nasl - Type: ACT_GATHER_INFO
2017-01-31 Name: The remote AIX host is missing a security patch.
File: aix_IV90234.nasl - Type: ACT_GATHER_INFO
2017-01-31 Name: The remote AIX host is missing a security patch.
File: aix_IV91456.nasl - Type: ACT_GATHER_INFO
2017-01-31 Name: The remote AIX host is missing a security patch.
File: aix_IV91487.nasl - Type: ACT_GATHER_INFO
2017-01-31 Name: The remote AIX host is missing a security patch.
File: aix_IV91488.nasl - Type: ACT_GATHER_INFO
2017-01-30 Name: The remote AIX host is missing a security patch.
File: aix_IV92238.nasl - Type: ACT_GATHER_INFO