Page 15 of 136 results (0.007 seconds)

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in invscout in Inventory Scout in invscout.rte in IBM AIX 5.2 and 5.3 allows local users to delete system files that have names matching the final substring of a hostname alias, as demonstrated by hostnames ending in "unix". Vulnerabilidad no especificada en invscout en Inventory Scout en invscout.rte en IBM AIX 5.2 y 5.3 permite a usuarios locales borrar archivos del sistema que tengan nombres que validan el final de la cadena un alias de un nombre de host, como se demostró con la finalización de un nombre de host en "unix". • http://osvdb.org/40393 http://secunia.com/advisories/26715 http://www-1.ibm.com/support/docview.wss?uid=isg1IY98506 http://www.securityfocus.com/bid/25556 http://www.vupen.com/english/advisories/2007/3059 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3846 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3847 https://exchange.xforce.ibmcloud.com/vulnerabilities/36447 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in IBM AIX 5.2 and 5.3 allow local users in the system group to gain root privileges via unspecified vectors involving the (1) chpath, (2) rmpath, and (3) devinstall programs in bos.rte.methods. Múltiples desbordamientos de búfer en IBM AIX 5.2 y 5.3 permiten a usuarios locales en el grupo system obtener privilegios de root mediante vectores no especificados involucrando los programas (1) chpath, (2) rmpath, y (3) devinstall en bos.rte.methods. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/26420 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00531 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ01433 http://www.securityfocus.com/bid/25270 http://www.securitytracker.com/id?1018549 http://www.vupen.com/english/advisories/2007/2860 https://exchange.xforce.ibmcloud.com/vulnerabilities/35971 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the at program on IBM AIX 5.3 allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer en el programa at de IBM AIX 5.3 permite a usuarios locales obtener privilegios a través de vectores no especificados. • ftp://aix.software.ibm.com/aix/efixes/security/README http://osvdb.org/36794 http://secunia.com/advisories/26437 http://www.securityfocus.com/bid/25273 http://www.securitytracker.com/id?1018570 http://www.vupen.com/english/advisories/2007/2905 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200708%2FSECURITY%2F20070810%2Fdatafile101113 https://exchange.xforce.ibmcloud.com/vulnerabilities/35976 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in fileplace in bos.perf.tools in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer en fileplace en bos.perf.tools de IBM AIX 5.2 y 5.3 permite a usuarios locales obtener privilegios a través de vectores no especificados. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/26420 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00149 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00154 http://www.securityfocus.com/bid/25271 http://www.securitytracker.com/id?1018550 http://www.vupen.com/english/advisories/2007/2860 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200708%2FSECURITY%2F20070810%2Fdatafile101707 https://exchan •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in lpd in bos.rte.printers in AIX 5.2 and 5.3 allows local users with printq group privileges to gain root privileges. Desbordamiento de búfer en el lpd del bos.rte.printers en el AIX 5.2 y 5.3 permite a usuarios locales con privilegios de grupo printq obtener privilegios de super administrador (root). • http://secunia.com/advisories/26219 http://securitytracker.com/id?1018467 http://www-1.ibm.com/support/docview.wss?uid=isg1IY98339 http://www-1.ibm.com/support/docview.wss?uid=isg1IY98560 http://www.vupen.com/english/advisories/2007/2678 •