Page 14 of 163 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

08 Feb 2005 — Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument. • http://secunia.com/advisories/14198 •

CVSS: 9.1EPSS: 0%CPEs: 32EXPL: 2

07 Feb 2005 — Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. • https://www.exploit-db.com/exploits/791 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 3

31 Dec 2004 — Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

22 Dec 2004 — Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod... • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only •

CVSS: 7.8EPSS: 1%CPEs: 7EXPL: 2

22 Dec 2004 — Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que ... • https://www.exploit-db.com/exploits/701 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 3

20 Dec 2004 — Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program. • https://www.exploit-db.com/exploits/25039 •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

28 Sep 2004 — The ctstrtcasd program in RSCT 2.3.0.0 and earlier on IBM AIX 5.2 and 5.3 does not properly drop privileges before executing the -f option, which allows local users to modify or create arbitrary files. El programa ctstrtcasd en RSCT 2.3.0.0 y anteriores para IBM AIX 5.2 Y 5.3 no se deshace adecuamente de privilegios antes de ejecutar la opción -f, lo que permite a usuarios locales modificar o crear ficheros arbitrarios. • http://secunia.com/advisories/12664 •

CVSS: 9.8EPSS: 0%CPEs: 91EXPL: 0

03 Mar 2003 — The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html •

CVSS: 7.2EPSS: 0%CPEs: 47EXPL: 0

23 Jul 2002 — CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. El servidor de bases de datos CDE ToolTalk (ttdbserver) permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque en enlaces simbólicos (symlink attack) en el fichero de registro (log) de transacciones usado por el procedimiento RPC _TT_TRANSACTION • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt •

CVSS: 9.8EPSS: 23%CPEs: 46EXPL: 0

12 Jul 2002 — CDE ToolTalk database server (ttdbserver) allows remote attackers to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure. El sevidor de bases de datos CDE ToolTalk (ttdbserver) permite a atacantes remotos sobrescribir posiciones arbitrarias de memoria con ceros, y posiblemente ganar privilegios, mediante un arguemnte de descriptor de fichero en una llamada al... • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt •