
CVE-2005-0250
https://notcve.org/view.php?id=CVE-2005-0250
08 Feb 2005 — Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument. • http://secunia.com/advisories/14198 •

CVE-2005-0156 – Setuid perl - 'PerlIO_Debug()' Local Overflow
https://notcve.org/view.php?id=CVE-2005-0156
07 Feb 2005 — Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. • https://www.exploit-db.com/exploits/791 •

CVE-2005-0240
https://notcve.org/view.php?id=CVE-2005-0240
07 Feb 2005 — Format string vulnerability in chdev on IBM AIX 5.2 allows local users to execute arbitrary code via format string specifiers in a command line argument, which is not properly handled when printing an error message. • http://www-1.ibm.com/support/docview.wss?uid=isg1IY67455 •

CVE-2004-2634
https://notcve.org/view.php?id=CVE-2004-2634
31 Dec 2004 — The (1) bos.rte.serv_aid or (2) bos.rte.console filesets in IBM AIX 5.1 and 5.2 allow local users to overwrite arbitrary files via a symlink attack on temporary files via unknown attack vectors. • http://secunia.com/advisories/11496 •

CVE-2004-2388
https://notcve.org/view.php?id=CVE-2004-2388
31 Dec 2004 — rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user. • http://secunia.com/advisories/11085 •

CVE-2004-1330 – AIX 5.1 < 5.3 - paginit Local Stack Overflow
https://notcve.org/view.php?id=CVE-2004-1330
31 Dec 2004 — Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 •

CVE-2004-2697 – AIX 4.3.3/5.1 - Invscoutd Symbolic Link
https://notcve.org/view.php?id=CVE-2004-2697
31 Dec 2004 — The Inventory Scout daemon (invscoutd) 1.3.0.0 and 2.0.2 for AIX 4.3.3 and 5.1 allows local users to gain privileges via a symlink attack on a command line argument (log file). NOTE: this might be related to CVE-2006-5002. • https://www.exploit-db.com/exploits/23883 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2004-2312 – GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-2312
31 Dec 2004 — Buffer overflow in GNU make for IBM AIX 4.3.3, when installed setgid, allows local users to gain privileges via a long CC argument. • https://www.exploit-db.com/exploits/23838 •

CVE-2004-1054 – AIX 4.3/5.1 < 5.3 - 'lsmcode' Execution Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-1054
22 Dec 2004 — Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que ... • https://www.exploit-db.com/exploits/701 •

CVE-2004-1028
https://notcve.org/view.php?id=CVE-2004-1028
22 Dec 2004 — Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod... • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only •