exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 429 RSS Feed

Operating System: AIX

CA ARCserve Backup Apache HTTP Server
Posted May 1, 2009
Authored by Ken Williams | Site www3.ca.com

CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX contains multiple vulnerabilities in the Apache HTTP Server version as shipped with ARCserve Backup. CA has issued updates that contain version 2.0.63 of the Apache HTTP Server to address the vulnerabilities.

tags | advisory, web, vulnerability
systems | solaris, aix, hpux
advisories | CVE-2004-0747, CVE-2003-0132
SHA-256 | d86ddfa32f66c166dab389f1acfc4382cf2d3e171fd0b28f0cb00c76bf5575e6
Samhain File Integrity Checker 2.5.5
Posted Apr 30, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | c77db0597646e9d8a0d3416b70fc6b744e843d6d8146c9c33322088de965129d
Secunia Security Advisory 34662
Posted Apr 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 02e5446848202dd906e4f7c8ada79527df8b7cfb38c1bd582b8c3b32dd5c9180
iDEFENSE Security Advisory 2009-04-15.1
Posted Apr 15, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 04.15.09 - Local exploitation of a buffer overflow vulnerability in IBM Corp.'s Advanced Interactive eXecutive (AIX) could allow an attacker to gain root privileges. The set-uid root binary "muxatmd" concatenates the calling program name with the static string ".pid". The destination buffer passed to the function call used for concatenation is a static-sized stack buffer. Since no bounds checking is performed, a stack-based buffer overflow can occur when a long program name is given. iDefense has confirmed the existence of this vulnerability in IBM Corp.'s AIX version 5.3 (5300-09-02-0849). Other versions may also be affected.

tags | advisory, overflow, local, root
systems | aix
SHA-256 | 3b317e77470c29314f27d74a37e2613a44dff497e0d08d313ad991e166571d2a
Samhain File Integrity Checker 2.5.4
Posted Mar 5, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 4bab09503632cca180ca6d63e9b714c2a720ca80e8534d3f1d67ce17a33ffcd7
Secunia Security Advisory 34005
Posted Feb 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | ca2c3e6a426f0b9351549d951239c2bab67ee14d32d8eb3da491ad8465cf73ca
Secunia Security Advisory 33915
Posted Feb 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 71c620b075d1293df5733bf05861d1680dc1415826a46c5fd315963589e15bc6
Secunia Security Advisory 33773
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a security issue in IBM AIX, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 57eadc1ede471af0c2252a4b8981456259d0c656fcaa30dce854fbe71a23c157
Samhain File Integrity Checker 2.5.2b
Posted Jan 29, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | b2ef5393184af31230d6e794d28c8389b934bee1b0dc928852b586c40e6fcfe5
Samhain File Integrity Checker 2.5.1
Posted Dec 22, 2008
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 501c715144fbfe9b3cd17ab20de171782c8bdf2823ddadb991cb1bc4a252bbaa
Secunia Security Advisory 32916
Posted Nov 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | aix
SHA-256 | a942dcf4c9982151fd7b5c813c54f0b0922991109e567d5dd36d28870278ee31
Samhain File Integrity Checker 2.5.0
Posted Nov 1, 2008
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 52d04a0a3188dce04b209d167f90a2a97b042cc9e6ab5a6ef5938617e4304a2a
Secunia Security Advisory 31739
Posted Sep 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 268d06a5c59f68a7f4fa68a8ba58896341f3345a127393e0d5d7052cf993a2bb
Samhain File Integrity Checker 2.4.6
Posted Sep 3, 2008
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 90f5459e742e79f0fd86240b4ba0a584b2963d01b24ba8cfb2fa0cf529b1535f
Samhain File Integrity Checker 2.4.5
Posted Aug 18, 2008
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 262eef9c51831d5a490b2917bbefb73e6cb116b1726feb723f3235c2a9118358
Secunia Security Advisory 31094
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | aix
SHA-256 | 0c02daee2344de4a689b935c8cae1d3510ec88721003102bf43117b8ca0b0fce
Secunia Security Advisory 30360
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in IBM AIX, which can be exploited by malicious people to disclose system information.

tags | advisory
systems | aix
SHA-256 | 7b5014a03048ed2a6fc25ee0b197386be1fda83098e4618f7768e230e4407862
Secunia Security Advisory 30349
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | aix
SHA-256 | f2287ead1d8b90aab21f855bfa40e4fe824c52a671534240c558cdd57b907215
Samhain File Integrity Checker 2.4.4
Posted May 6, 2008
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | af567b701506a3cac7903a08e599312cc2f8d3b4301bdd6b6e32ccd0fde77a84
Secunia Security Advisory 29518
Posted Mar 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM AIX.

tags | advisory
systems | aix
SHA-256 | e0653f263f863c56d0901919d4706185a53ffa0cbcfca94da633091587216025
Secunia Security Advisory 29349
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities are reported in IBM AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | aix
SHA-256 | 581b5a26de977821ccc2802ac26fa0700bd4a134772d858d7f27173e15489f56
Secunia Security Advisory 29347
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 18fa4a6b4cf0e732d69f6fb9c8a027565b18a6ff732d9a7d5776f9f8b9788281
Secunia Security Advisory 29301
Posted Mar 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 5044ac6a821c0ed7fc87c6c117a0b419b0be1e7c7a1cf10f793c6e76a306fb7e
Secunia Security Advisory 29139
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | aix
SHA-256 | aafeb3f66030fb5882a80b5cedaf02847a6c722d846f4a9c86ecbd393bd5104e
Secunia Security Advisory 29161
Posted Feb 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in AIX, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | aix
SHA-256 | ad220b305fded369310a792e27cfb96ed77eac8331b91091b9440a690753f80c
Page 7 of 18
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close