Page 2 of 35 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IBM AIX 5.2 and earlier distributes Sendmail with a configuration file (sendmail.cf) with the (1) promiscuous_relay, (2) accept_unresolvable_domains, and (3) accept_unqualified_senders features enabled, which allows Sendmail to be used as an open mail relay for sending spam e-mail. IBM AIX 5.2 y anteriores, distribuyen Sendmail con un fichero de configuración (sendmail.cf) con varias caracteristicas habilitadas, lo que permite a Sendmail ser utilizado como emisor de correo para spam. Las caracteristicas habilitadas son: promiscuous_relay. accept_unresolvable_domains. accept_unqualified_senders. • http://marc.info/?l=bugtraq&m=105284689228961&w=2 http://security.sdsc.edu/advisories/2003.05.13-AIX-sendmail.txt http://www.kb.cert.org/vuls/id/814617 http://www.securityfocus.com/bid/7580 https://exchange.xforce.ibmcloud.com/vulnerabilities/11993 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in autofs on AIX 4.3.0, when using executable maps, allows attackers to execute arbitrary commands as root, possibly related to "string handling around how the executable map is called." • http://archives.neohapsis.com/archives/aix/2002-q4/0002.html https://exchange.xforce.ibmcloud.com/vulnerabilities/19159 •

CVSS: 7.5EPSS: 0%CPEs: 91EXPL: 0

The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 0

Buffer overflow in the file_comp function in rcp for IBM AIX 4.3.x and 5.1 allows remote attackers to execute arbitrary code. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY26503&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY28698&apar=only http://www.kb.cert.org/vuls/id/209363 http://www.kb.cert.org/vuls/id/SVIM-59FJVF •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

Buffer overflow in the FC client for IBM AIX 4.3.x allows remote attackers to cause a denial of service (crash and core dump). • http://www-1.ibm.com/support/search.wss?rs=0&q=IY27310&apar=only http://www.kb.cert.org/vuls/id/152955 https://exchange.xforce.ibmcloud.com/vulnerabilities/10127 •