Page 16 of 93 results (0.015 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in getconf in IBM AIX 5.2 to 5.3 allows local users to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16996 http://securitytracker.com/id?1014991 http://www-1.ibm.com/support/docview.wss?uid=isg1IY73814 http://www-1.ibm.com/support/docview.wss?uid=isg1IY73850 http://www.kb.cert.org/vuls/id/602300 http://www.osvdb.org/19719 http://www.securityfocus.com/bid/14959 https://exchange.xforce.ibmcloud.com/vulnerabilities/22442 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0004.txt http://www.security-focus.com/advisories/8819 http://www.securityfocus.com/bid/13912 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

ftpd in IBM AIX 5.1, 5.2 and 5.3 allows remote authenticated users to cause a denial of service (port exhaustion and memory consumption) by using all ephemeral ports. • http://securitytracker.com/id?1014421 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 6

Buffer overflow in invscout in IBM AIX 5.1.0 through 5.3.0 might allow local users to execute arbitrary code via a long command line argument. • https://www.exploit-db.com/exploits/1046 http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0002.txt http://www.securityfocus.com/advisories/8816 http://www.securityfocus.com/bid/13909 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •