Page 18 of 93 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in ipl_varyon on AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via a long -d argument. • https://www.exploit-db.com/exploits/1045 http://secunia.com/advisories/14231 http://www-1.ibm.com/support/search.wss?rs=0&q=IY66933&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY67750&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY67812&apar=only http://www.idefense.com/application/poi/display?id=196&type=vulnerabilities http://www.securityfocus.com/bid/12516 https://exchange.xforce.ibmcloud.com/vulnerabilities/19282 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument. • http://secunia.com/advisories/14198 http://securitytracker.com/id?1013103 http://www-1.ibm.com/support/docview.wss?uid=isg1IY67472 http://www-1.ibm.com/support/docview.wss?uid=isg1IY67519 http://www-1.ibm.com/support/docview.wss?uid=isg1IY67802 http://www.idefense.com/application/poi/display? •

CVSS: 2.1EPSS: 0%CPEs: 32EXPL: 2

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. • https://www.exploit-db.com/exploits/791 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110737149402683&w=2 http://marc.info/?l=full-disclosure&m=110779721503111&w=2 http://secunia.com/advisories/14120 http://secunia.com/advisories/55314 http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml http://www.mandriva. •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 3

Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 http://marc.info/?l=bugtraq&m=110355931920123&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64312&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64358&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64522&apar=only http://www.frsirt.com/exploits/20041220.paginit.c.php http://www.securityfocus.com/bid/12043 https://exchange.xforce.ibmcloud.com/vulnerabilities/18618 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64355&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64356&apar=only http://www.idefense.com/application/poi/display?id=170&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18625 •