Page 3 of 40 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Buffer overflow in the chcons (chcon) command in IBM AIX 5.2 and 5.3, when DEBUG MALLOC is enabled, might allow attackers to execute arbitrary code via a long command line argument. • http://secunia.com/advisories/17380 http://securityreason.com/securityalert/261 http://securitytracker.com/id?1015122 http://www-1.ibm.com/support/docview.wss?uid=isg1IY78241 http://www-1.ibm.com/support/docview.wss?uid=isg1IY78253 http://www.securityfocus.com/bid/15247 http://www.vupen.com/english/advisories/2005/2253 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5470 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0004.txt http://www.security-focus.com/advisories/8819 http://www.securityfocus.com/bid/13912 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

ftpd in IBM AIX 5.1, 5.2 and 5.3 allows remote authenticated users to cause a denial of service (port exhaustion and memory consumption) by using all ephemeral ports. • http://securitytracker.com/id?1014421 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 6

Buffer overflow in invscout in IBM AIX 5.1.0 through 5.3.0 might allow local users to execute arbitrary code via a long command line argument. • https://www.exploit-db.com/exploits/1046 http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0002.txt http://www.securityfocus.com/advisories/8816 http://www.securityfocus.com/bid/13909 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •