Page 6 of 63 results (0.021 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64355&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64356&apar=only http://www.idefense.com/application/poi/display?id=170&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18625 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 2

Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que es ejecutado desde lsvpd después de que lsvpd haya sido ejecutado por invscout • https://www.exploit-db.com/exploits/701 https://www.exploit-db.com/exploits/898 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64820&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64852&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64976&apar=only http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18619 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 3

Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program. • https://www.exploit-db.com/exploits/25039 http://marc.info/?l=bugtraq&m=110355931920123&w=2 http://www-1.ibm.com/support/search.wss?rs=0&q=IY64277&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY64389&apar=only http://www.securityfocus.com/archive/1/464276/100/0/threaded http://www.securityfocus.com/archive/1/464481/100/0/threaded http://www.securityfocus.com/bid/12041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18620 https://www.exploit-d •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

LVM for AIX 5.1 and 5.2 allows local users to overwrite arbitrary files via a symlink attack. LVM de AIX 5.1 Y 5.2 permite a usuarios locales sobreescribir ficheros de su elección mediante un ataque de enlaces simbólicos (symlink attack) • http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2 http://www.ciac.org/ciac/bulletins/o-131.shtml http://www.securityfocus.com/bid/10230 https://exchange.xforce.ibmcloud.com/vulnerabilities/16011 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 3

Multiple buffer overflows in LVM for AIX 5.1 and 5.2 allow local users to gain privileges via the (1) putlvcb or (2) getlvcb commands. Múltiples desbordamientos de búfer en LVM de AIX 5.1 y 5.2 permite a usuarios locales ganar privilegios mediante comandos (1)putlvcb o (2) getlvcb. • https://www.exploit-db.com/exploits/23840 https://www.exploit-db.com/exploits/23841 http://secunia.com/advisories/11158 http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2 http://www-1.ibm.com/support/docview.wss?uid=isg1IY55681 http://www-1.ibm.com/support/docview.wss?uid=isg1IY55682 http://www.ciac.org/ciac/bulletins/o-131.shtml http://www.osvdb.org/4392 http://www.osvdb.org/4393 http://www.securityfocus.com/bid/9905 http& •