Page 2 of 40 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which allows local users to gain privileges by modifying the path to point to a malicious hostname program. • http://www.kb.cert.org/vuls/id/17566 https://exchange.xforce.ibmcloud.com/vulnerabilities/6432 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 0

Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0275.html http://www.securityfocus.com/bid/1241 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in crontab in IBM AIX 3.2 allows local users to gain root privileges via unknown attack vectors. • http://www.cert.org/advisories/CA-1992-10.html http://www.securityfocus.com/bid/357 •

CVSS: 10.0EPSS: 3%CPEs: 5EXPL: 1

Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler. • https://www.exploit-db.com/exploits/21093 http://www.ciac.org/ciac/bulletins/j-059.shtml http://www.securityfocus.com/bid/590 •