CVE-2005-2235
https://notcve.org/view.php?id=CVE-2005-2235
Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0004.txt http://www.security-focus.com/advisories/8819 http://www.securityfocus.com/bid/13912 •
CVE-2005-2233
https://notcve.org/view.php?id=CVE-2005-2233
Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •
CVE-2005-2234
https://notcve.org/view.php?id=CVE-2005-2234
Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0005.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13914 •
CVE-2005-1176
https://notcve.org/view.php?id=CVE-2005-1176
Race condition in JFS2 on AIX 5.2 and 5.3, when deleting a file while I/O is still occurring for that file, may write data to a different file, which could leak sensitive information. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY70032&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY70034&apar=only https://exchange.xforce.ibmcloud.com/vulnerabilities/20604 •
CVE-2005-0991
https://notcve.org/view.php?id=CVE-2005-0991
RC.BOOT in IBM AIX 5.1, 5.2, and 5.3 does not "use a secure location for temporary files," which allows local users to have an unknown impact, probably by overwriting files. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY59205&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59206&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59207&apar=only http://www.securityfocus.com/bid/12992 •