Page 20 of 126 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 2

Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que es ejecutado desde lsvpd después de que lsvpd haya sido ejecutado por invscout • https://www.exploit-db.com/exploits/701 https://www.exploit-db.com/exploits/898 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64820&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64852&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64976&apar=only http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18619 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 3

Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program. • https://www.exploit-db.com/exploits/25039 http://marc.info/?l=bugtraq&m=110355931920123&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64277&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64389&apar=only http://www.securityfocus.com/archive/1/464276/100/0/threaded http://www.securityfocus.com/archive/1/464481/100/0/threaded http://www.securityfocus.com/bid/12041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18620 https://www.exploit-d •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The ctstrtcasd program in RSCT 2.3.0.0 and earlier on IBM AIX 5.2 and 5.3 does not properly drop privileges before executing the -f option, which allows local users to modify or create arbitrary files. El programa ctstrtcasd en RSCT 2.3.0.0 y anteriores para IBM AIX 5.2 Y 5.3 no se deshace adecuamente de privilegios antes de ejecutar la opción -f, lo que permite a usuarios locales modificar o crear ficheros arbitrarios. • http://secunia.com/advisories/12664 http://securitytracker.com/id?1011429 http://www.securityfocus.com/bid/11264 https://exchange.xforce.ibmcloud.com/vulnerabilities/17514 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

LVM for AIX 5.1 and 5.2 allows local users to overwrite arbitrary files via a symlink attack. LVM de AIX 5.1 Y 5.2 permite a usuarios locales sobreescribir ficheros de su elección mediante un ataque de enlaces simbólicos (symlink attack) • http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2 http://www.ciac.org/ciac/bulletins/o-131.shtml http://www.securityfocus.com/bid/10230 https://exchange.xforce.ibmcloud.com/vulnerabilities/16011 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 3

Multiple buffer overflows in LVM for AIX 5.1 and 5.2 allow local users to gain privileges via the (1) putlvcb or (2) getlvcb commands. Múltiples desbordamientos de búfer en LVM de AIX 5.1 y 5.2 permite a usuarios locales ganar privilegios mediante comandos (1)putlvcb o (2) getlvcb. • https://www.exploit-db.com/exploits/23840 https://www.exploit-db.com/exploits/23841 http://secunia.com/advisories/11158 http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2 http://www-1.ibm.com/support/docview.wss?uid=isg1IY55681 http://www-1.ibm.com/support/docview.wss?uid=isg1IY55682 http://www.ciac.org/ciac/bulletins/o-131.shtml http://www.osvdb.org/4392 http://www.osvdb.org/4393 http://www.securityfocus.com/bid/9905 http& •