Page 15 of 76 results (0.016 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in AIX 5.3.0, when configured as an NIS client, allows remote attackers to gain root privileges. • http://secunia.com/advisories/14856 http://www-1.ibm.com/support/search.wss?rs=0&q=IY68825&apar=only http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

RC.BOOT in IBM AIX 5.1, 5.2, and 5.3 does not "use a secure location for temporary files," which allows local users to have an unknown impact, probably by overwriting files. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY59205&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59206&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59207&apar=only http://www.securityfocus.com/bid/12992 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 3

Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 http://marc.info/?l=bugtraq&m=110355931920123&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64312&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64358&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64522&apar=only http://www.frsirt.com/exploits/20041220.paginit.c.php http://www.securityfocus.com/bid/12043 https://exchange.xforce.ibmcloud.com/vulnerabilities/18618 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64355&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64356&apar=only http://www.idefense.com/application/poi/display?id=170&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18625 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 2

Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que es ejecutado desde lsvpd después de que lsvpd haya sido ejecutado por invscout • https://www.exploit-db.com/exploits/701 https://www.exploit-db.com/exploits/898 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64820&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64852&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64976&apar=only http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18619 •