Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 6.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2018-1655
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748.
Ibm Aix 7.2
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
9
CVSSv2
CVE-2018-1383
A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117.
Ibm Aix 7.2.2
Ibm Aix 7.1.3
Ibm Aix 7.1.1
Ibm Aix 6.1.5
Ibm Aix 6.1.7
Ibm Aix 6.1
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 6.1.3
Ibm Aix 7.2.1
Ibm Aix 7.2
Ibm Aix 7.1.5
Ibm Aix 7.1.4
Ibm Aix 6.1.9
Ibm Aix 7.1.2
Ibm Aix 7.1
Ibm Aix 6.1.4
Ibm Aix 6.1.6
Ibm Aix 6.1.8
1 Article
7.2
CVSSv2
CVE-2017-1692
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM X-Force ID: 134067.
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
7.5
CVSSv2
CVE-2017-1541
A flaw in the AIX 5.3, 6.1, 7.1, and 7.2 JRE/SDK installp and updatep packages prevented the java.security, java.policy and javaws.policy files from being updated correctly. IBM X-Force ID: 130809.
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
7.2
CVSSv2
CVE-2016-6079
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM APARs: IV88658, IV87981, IV88419, IV87640, IV88053.
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 5.3
Ibm Vios 2.2.1.0
Ibm Vios 2.2.1.1
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
Ibm Vios 2.2.3.2
Ibm Vios 2.2.3.3
Ibm Vios 2.2.3.80
Ibm Vios 2.2.4.0
Ibm Vios 2.2.0.10
Ibm Vios 2.2.0.11
Ibm Vios 2.2.1.5
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.6
Ibm Vios 2.2.2.70
Ibm Vios 2.2.3.51
Ibm Vios 2.2.3.52
Ibm Vios 2.2.4.22
1 EDB exploit
7.2
CVSSv2
CVE-2016-8972
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011.
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Vios 2.2.0.11
Ibm Vios 2.2.0.12
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.6
Ibm Vios 2.2.2.70
Ibm Vios 2.2.3.0
Ibm Vios 2.2.3.52
Ibm Vios 2.2.3.60
Ibm Vios 2.2.4.23
Ibm Vios 2.2.4.30
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.0
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.0
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.2
Ibm Vios 2.2.3.70
Ibm Vios 2.2.3.80
1 EDB exploit
7.2
CVSSv2
CVE-2017-1093
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges.
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Aix 7.1
7.2
CVSSv2
CVE-2016-3053
IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges.
Ibm Aix
1 EDB exploit
4
CVSSv2
CVE-2016-6038
Directory traversal vulnerability in Eclipse Help in IBM Tivoli Lightweight Infrastructure (aka LWI), as used in AIX 5.3, 6.1, and 7.1, allows remote authenticated users to read arbitrary files via a crafted URL.
Ibm Aix 6.1
Ibm Aix 5.3
Ibm Aix 7.1
4.3
CVSSv2
CVE-2016-0266
IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x do not default to the latest TLS version, which makes it easier for man-in-the-middle malicious users to obtain sensitive information via unspecified vectors.
Ibm Vios 2.2.3.60
Ibm Vios 2.2.3.52
Ibm Vios 2.2.3.51
Ibm Vios 2.2.0.12
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.7
Ibm Vios 2.2.1.8
Ibm Vios 2.2.3.0
Ibm Vios 2.2.3.1
Ibm Vios 2.2.4.21
Ibm Vios 2.2.4.10
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Vios 2.2.1.3
Ibm Vios 2.2.1.4
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
Ibm Vios 2.2.3.4
Ibm Aix 5.3
Ibm Vios 2.2.4.0
Ibm Vios 2.2.3.70
Ibm Vios 2.2.0.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »