Page 22 of 136 results (0.008 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

lscfg in IBM AIX 5.2 and 5.3 allows local users to modify arbitrary files via a symlink attack. • http://securitytracker.com/id?1015622 http://www-1.ibm.com/support/docview.wss?uid=isg1IY77624 http://www-1.ibm.com/support/docview.wss?uid=isg1IY77638 http://www.vupen.com/english/advisories/2005/2096 •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the (1) unix_mp and (2) unix_64 kernels in IBM AIX 5.3 VRMF 5.3.0.30 through 5.3.0.33 allows local users to cause a denial of service (system crash) via unknown vectors related to EMULATE_VMX. • http://secunia.com/advisories/18795 http://www-1.ibm.com/support/search.wss?rs=0&q=IY79595&apar=only http://www.osvdb.org/23127 http://www.securityfocus.com/bid/16624 http://www.vupen.com/english/advisories/2006/0573 https://exchange.xforce.ibmcloud.com/vulnerabilities/24711 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in the arp command of IBM AIX 5.3 L, 5.3, 5.2.2, 5.2 L, and 5.2 allows local users to cause a denial of service (crash) via a long iftype argument. • http://secunia.com/advisories/18773 http://www-1.ibm.com/support/docview.wss?rs=0&q1=IY81424&uid=isg1IY81424&loc=en_US&cs=utf-8&cc=us&lang=en http://www-1.ibm.com/support/docview.wss?uid=isg1IY81476 http://www.securityfocus.com/bid/16584 http://www.vupen.com/english/advisories/2006/0531 https://exchange.xforce.ibmcloud.com/vulnerabilities/24628 •

CVSS: 10.0EPSS: 7%CPEs: 7EXPL: 0

Multiple buffer overflows in IBM AIX 5.1, 5.2, and 5.3 allow remote attackers to execute arbitrary code via (1) muxatmd and (2) slocal. • http://secunia.com/advisories/18088 http://securitytracker.com/id?1015366 http://securitytracker.com/id?1015367 http://www-1.ibm.com/support/search.wss?rs=0&q=IY78221&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY78222&apar=only http://www-1.ibm.com/support/search.wss? •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Multiple unspecified vulnerabilities in (1) getShell and (2) getCommand in IBM AIX 5.3 allow local users to append to arbitrary files. • http://secunia.com/advisories/18088 http://www.securityfocus.com/archive/1/419577/100/0/threaded http://www.securityfocus.com/archive/1/419634/100/0/threaded http://www.securityfocus.com/archive/1/419641/100/0/threaded http://www.securityfocus.com/bid/15880 http://www.vupen.com/english/advisories/2005/2947 •