
CVE-2005-2234
https://notcve.org/view.php?id=CVE-2005-2234
12 Jul 2005 — Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 •

CVE-2005-2233
https://notcve.org/view.php?id=CVE-2005-2233
12 Jul 2005 — Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 •

CVE-2005-2235
https://notcve.org/view.php?id=CVE-2005-2235
12 Jul 2005 — Buffer overflow in the diagTasksWebSM command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 •

CVE-2005-0991
https://notcve.org/view.php?id=CVE-2005-0991
06 Apr 2005 — RC.BOOT in IBM AIX 5.1, 5.2, and 5.3 does not "use a secure location for temporary files," which allows local users to have an unknown impact, probably by overwriting files. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY59205&apar=only •

CVE-2004-1330 – AIX 5.1 < 5.3 - paginit Local Stack Overflow
https://notcve.org/view.php?id=CVE-2004-1330
31 Dec 2004 — Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username. • https://www.exploit-db.com/exploits/699 •

CVE-2004-1054 – AIX 4.3/5.1 < 5.3 - 'lsmcode' Execution Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-1054
22 Dec 2004 — Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout. Vulnerabilidad de camino de ejecución no confiable en invscout de IBM AIX 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ganar privilegios modificando la variable de entorno PATH para que apunte a un programa "uname" malicioso, que ... • https://www.exploit-db.com/exploits/701 •

CVE-2004-1028
https://notcve.org/view.php?id=CVE-2004-1028
22 Dec 2004 — Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. Vulnerabilidad de camino de ejecución no de confianza en chcod de AIX IBM 5.1.0, 5.2.0 y 5.3.0 permite a usuarios locales ejecutar programas arbitrarios modificando la variable de entorno PATH para apuntar a una programa "grep" malicioso, que es ejecutado desde chcod... • http://www-1.ibm.com/support/search.wss?rs=0&q=IY64354&apar=only •

CVE-2004-1329 – IBM AIX 5.x - 'Diag' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-1329
20 Dec 2004 — Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program. • https://www.exploit-db.com/exploits/25039 •