Page 11 of 58 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0004.txt http://www.security-focus.com/advisories/8819 http://www.securityfocus.com/bid/13912 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0005.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13914 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

RC.BOOT in IBM AIX 5.1, 5.2, and 5.3 does not "use a secure location for temporary files," which allows local users to have an unknown impact, probably by overwriting files. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY59205&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59206&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59207&apar=only http://www.securityfocus.com/bid/12992 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 3

Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 http://marc.info/?l=bugtraq&m=110355931920123&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64312&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64358&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64522&apar=only http://www.frsirt.com/exploits/20041220.paginit.c.php http://www.securityfocus.com/bid/12043 https://exchange.xforce.ibmcloud.com/vulnerabilities/18618 •