Page 6 of 59 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables. • https://www.exploit-db.com/exploits/20455 http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY12638&apar=only http://www.securityfocus.com/bid/2037 https://exchange.xforce.ibmcloud.com/vulnerabilities/5616 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands. • http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY12638&apar=only http://www.securityfocus.com/bid/2036 https://exchange.xforce.ibmcloud.com/vulnerabilities/5617 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 1

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument. • https://www.exploit-db.com/exploits/20452 http://marc.info/?l=bugtraq&m=97569466809056&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY08812&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY10721&apar=only http://www.osvdb.org/1676 http://www.securityfocus.com/bid/2032 https://exchange.xforce.ibmcloud.com/vulnerabilities/5621 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 1

netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities. • https://www.exploit-db.com/exploits/20213 http://archives.neohapsis.com/archives/bugtraq/2000-08/0454.html http://www.securityfocus.com/bid/1660 https://exchange.xforce.ibmcloud.com/vulnerabilities/5214 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 https://www.exploit-db.com/exploits/209 https://www.exploit-db.com/exploits/215 https://www.exploit-db.com/exploits/249 https://www.exploit-db.com/exploits/20185 https://www.exploit-db.com/exploits/210 https://www.exploit-db.com/exploits/20188 https://www.exploit-db.com/exploits/20186 https://www.exploit-db.com/exploits/197 https://www.exploit-db.com/exploits/20189 https://www.exploit-db.com/exploits/20190 ftp: • CWE-264: Permissions, Privileges, and Access Controls •