Page 2 of 59 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges. Vulnerabilidad de cadena de formato en la capacídad de impresión de IBM AIX .3, 5.1 y 5.2 pemite a usuarios locales ganar privilegios de printq o de root • http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.0660.1 https://exchange.xforce.ibmcloud.com/vulnerabilities/12000 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in lpd in the bos.rte.printers fileset for AIX 4.3 through 5.2, with debug enabled, allows local users to cause a denial of service (crash) or gain root privileges. Vulnerabilidad de cadena de formato en lpd en el conjunto de ficheros bos.rte.printers de AIX 4.3 a 5.2, con depuración activada, permite a usuarios locales causar una denegación de servicio (caída) o ganar privilegios de root. • http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2003.1605.1 http://www-1.ibm.com/support/search.wss?rs=0&q=IY45250&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY45344&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY46256&apar=only •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IBM AIX 5.2 and earlier distributes Sendmail with a configuration file (sendmail.cf) with the (1) promiscuous_relay, (2) accept_unresolvable_domains, and (3) accept_unqualified_senders features enabled, which allows Sendmail to be used as an open mail relay for sending spam e-mail. IBM AIX 5.2 y anteriores, distribuyen Sendmail con un fichero de configuración (sendmail.cf) con varias caracteristicas habilitadas, lo que permite a Sendmail ser utilizado como emisor de correo para spam. Las caracteristicas habilitadas son: promiscuous_relay. accept_unresolvable_domains. accept_unqualified_senders. • http://marc.info/?l=bugtraq&m=105284689228961&w=2 http://security.sdsc.edu/advisories/2003.05.13-AIX-sendmail.txt http://www.kb.cert.org/vuls/id/814617 http://www.securityfocus.com/bid/7580 https://exchange.xforce.ibmcloud.com/vulnerabilities/11993 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in autofs on AIX 4.3.0, when using executable maps, allows attackers to execute arbitrary commands as root, possibly related to "string handling around how the executable map is called." • http://archives.neohapsis.com/archives/aix/2002-q4/0002.html https://exchange.xforce.ibmcloud.com/vulnerabilities/19159 •