Page 17 of 111 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0005.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13914 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

RC.BOOT in IBM AIX 5.1, 5.2, and 5.3 does not "use a secure location for temporary files," which allows local users to have an unknown impact, probably by overwriting files. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY59205&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59206&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY59207&apar=only http://www.securityfocus.com/bid/12992 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

lspath in AIX 5.2, 5.3, and possibly earlier versions, does not drop privileges before processing the -f option, which allows local users to read one line of arbitrary files. • http://secunia.com/advisories/14232 http://www-1.ibm.com/support/search.wss?rs=0&q=IY67457&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY67655&apar=only http://www.idefense.com/application/poi/display?id=195&type=vulnerabilities http://www.securityfocus.com/bid/12513 https://exchange.xforce.ibmcloud.com/vulnerabilities/19281 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in netpmon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -O argument. • https://www.exploit-db.com/exploits/1044 http://secunia.com/advisories/14237 http://www-1.ibm.com/support/search.wss?rs=0&q=IY67124&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY67136&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY67807&apar=only http://www.idefense.com/application/poi/display?id=197&type=vulnerabilities http://www.securityfocus.com/bid/12517 https://exchange.xforce.ibmcloud.com/vulnerabilities/19278 •