Page 11 of 92 results (0.009 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in bos.rte.libc in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via the "r-commands", possibly including (1) rdist, (2) rsh, (3) rcp, (4) rsync, and (5) rlogin. Un desbordamiento de búfer en la biblioteca bos.rte.libc en IBM AIX versiones 5.2 y 5.3, permite a usuarios locales ejecutar código arbitrario por medio de los "r-commands", incluyendo posiblemente (1) rdist, (2) rsh, (3) rcp, (4) rsync, y (5) rlogin. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/23995 http://securitytracker.com/id?1017583 http://securitytracker.com/id?1017607 http://www-1.ibm.com/support/docview.wss?uid=isg1IY94301 http://www-1.ibm.com/support/docview.wss?uid=isg1IY94368 http://www.osvdb.org/31696 http://www.securityfocus.com/bid/22370 http://www.securityfocus.com/bid/22456 http://www.vupen.com/english/advisories/2007/0471 https://exchange.xforce.ibmcloud.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Unspecified vulnerability in ftpd in IBM AIX 5.2.0 and 5.3.0 allows remote attackers to obtain sensitive information, including passwords, via unspecified vectors. Vulnerabilidad no especificada en ftpd en IBM AIX 5.2.0 y 5.3.0 permite atacantes remotos obtener información sensible, incluido contraseñas, a través de vectores no especificados. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/23688 http://securitytracker.com/id?1017480 http://www-1.ibm.com/support/docview.wss?uid=isg1IY89168 http://www-1.ibm.com/support/docview.wss?uid=isg1IY91787 http://www.securityfocus.com/bid/21941 http://www.vupen.com/english/advisories/2007/0101 •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

ftpd in IBM AIX 5.2.0 and 5.3.0 allows remote authenticated users to cause a denial of service (port exhaustion) via unspecified vectors. NOTE: some details were obtained from third party sources. ftpd en IBMAIX5.2.0 y 5.3.0 permite a usuarios autenticados remotamente provocar una denegación de servicio (agotamiento de puertos) a través de vectores no especificados. NOTA: algunos de estos detalles se han obtenido de información de terceros. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/23688 http://securitytracker.com/id?1017480 http://www-1.ibm.com/support/docview.wss?uid=isg1IY89168 http://www-1.ibm.com/support/docview.wss?uid=isg1IY91787 http://www.securityfocus.com/bid/21940 http://www.vupen.com/english/advisories/2007/0101 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in xlock in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary commands and overwrite arbitrary files via unspecified vectors, possibly involving a buffer overflow. Vulnerabilidad no especificada en xlock en IBM AIX 5.2.0 y 5.3.0 permite a un usuario local ejecutar comandos de su elección y sobre escribir archivos de su elección a través de vectores no especificados, posiblemente involucrando al desbordamiento de búfer. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/22098 http://securitytracker.com/id?1016923 http://www-1.ibm.com/support/docview.wss?uid=isg1IY87894 http://www-1.ibm.com/support/docview.wss?uid=isg1IY87943 http://www.securityfocus.com/bid/20201 http://www.vupen.com/english/advisories/2006/3770 https://exchange.xforce.ibmcloud.com/vulnerabilities/29161 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Untrusted search path vulnerability in snappd in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary commands via a Trojan horse program, involving the "system subroutine". Vulnerabilidad de ruta de búsqueda no confiable en nappd en IBM AIX 5.2.0 y 5.3.0 permite a un usuario local ejecutar comandos de su elección a través de un programa de caballo de troya, involucrando a la "subrutina del sistema". • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/22108 http://securitytracker.com/id?1016919 http://www-1.ibm.com/support/docview.wss?uid=isg1IY88818 http://www-1.ibm.com/support/docview.wss?uid=isg1IY88820 http://www.securityfocus.com/bid/20193 http://www.vupen.com/english/advisories/2006/3770 https://exchange.xforce.ibmcloud.com/vulnerabilities/29157 •