Page 3 of 66 results (0.011 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20453 http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY08143&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY08287&apar=only http://www.securityfocus.com/bid/2033 https://exchange.xforce.ibmcloud.com/vulnerabilities/5620 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument. • https://www.exploit-db.com/exploits/20454 http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY08143&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY08287&apar=only http://www.securityfocus.com/bid/2034 https://exchange.xforce.ibmcloud.com/vulnerabilities/5619 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument. • http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY07790&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY07831&apar=only http://www.securityfocus.com/bid/2035 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 1

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument. • https://www.exploit-db.com/exploits/20452 http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY08812&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY10721&apar=only http://www.osvdb.org/1676 http://www.securityfocus.com/bid/2032 https://exchange.xforce.ibmcloud.com/vulnerabilities/5621 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which allows local users to gain privileges by modifying the path to point to a malicious hostname program. • http://www.kb.cert.org/vuls/id/17566 https://exchange.xforce.ibmcloud.com/vulnerabilities/6432 •