Page 24 of 136 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in getconf in IBM AIX 5.2 to 5.3 allows local users to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16996 http://securitytracker.com/id?1014991 http://www-1.ibm.com/support/docview.wss?uid=isg1IY73814 http://www-1.ibm.com/support/docview.wss?uid=isg1IY73850 http://www.kb.cert.org/vuls/id/602300 http://www.osvdb.org/19719 http://www.securityfocus.com/bid/14959 https://exchange.xforce.ibmcloud.com/vulnerabilities/22442 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0004.txt http://www.security-focus.com/advisories/8819 http://www.securityfocus.com/bid/13912 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0005.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13914 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 6

Buffer overflow in invscout in IBM AIX 5.1.0 through 5.3.0 might allow local users to execute arbitrary code via a long command line argument. • https://www.exploit-db.com/exploits/1046 http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0002.txt http://www.securityfocus.com/advisories/8816 http://www.securityfocus.com/bid/13909 •