Page 12 of 70 results (0.013 seconds)

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 0

Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote attackers to execute arbitrary code. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY26503&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY28698&apar=only http://www.kb.cert.org/vuls/id/209363 http://www.kb.cert.org/vuls/id/SVIM-59FJVF •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

Buffer overflow in the FC client for IBM AIX 4.3.x allows remote attackers to cause a denial of service (crash and core dump). • http://www-1.ibm.com/support/search.wss?rs=0&q=IY27310&apar=only http://www.kb.cert.org/vuls/id/152955 https://exchange.xforce.ibmcloud.com/vulnerabilities/10127 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in ftpd in IBM AIX 4.3 and 5.1 allows attackers to gain privileges. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY20486&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY23674&apar=only •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

Buffer overflows in (1) send_status, (2) kill_print, and (3) chk_fhost in lpd in AIX 4.3 and 5.1 allow remote attackers to gain root privileges. • http://www.cert.org/advisories/CA-2001-30.html http://www.kb.cert.org/vuls/id/388183 http://www.kb.cert.org/vuls/id/466239 http://www.kb.cert.org/vuls/id/722143 •