Vulnerabilities
Vulnerable Software
Ibm:  >> Aix  Security Vulnerabilities
Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.
CVSS Score
7.2
EPSS Score
0.0
Published
2001-01-09
Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands.
CVSS Score
7.2
EPSS Score
0.0
Published
2001-01-09
Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.
CVSS Score
7.2
EPSS Score
0.002
Published
2001-01-09
AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which allows local users to gain privileges by modifying the path to point to a malicious hostname program.
CVSS Score
7.2
EPSS Score
0.002
Published
2000-12-10
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
CVSS Score
10.0
EPSS Score
0.009
Published
2000-11-14
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
CVSS Score
2.1
EPSS Score
0.012
Published
2000-11-14
AIX cdmount allows local users to gain root privileges via shell metacharacters.
CVSS Score
7.2
EPSS Score
0.0
Published
2000-06-20
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
CVSS Score
5.0
EPSS Score
0.005
Published
2000-05-24
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
CVSS Score
7.2
EPSS Score
0.001
Published
2000-04-26
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
CVSS Score
7.2
EPSS Score
0.148
Published
2000-03-02


Contact Us

Shodan ® - All rights reserved