Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 6.1 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2018-1655
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748.
Ibm Aix 5.3
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
9.1
CVSSv3
CVE-2018-1383
A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117.
Ibm Aix 6.1.3
Ibm Aix 7.1.2
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1.1
Ibm Aix 6.1
Ibm Aix 6.1.2
Ibm Aix 7.1.1
Ibm Aix 7.2.2
Ibm Aix 7.2.1
Ibm Aix 7.1.5
Ibm Aix 7.1.4
Ibm Aix 7.1.3
Ibm Aix 6.1.4
Ibm Aix 6.1.5
Ibm Aix 6.1.6
Ibm Aix 6.1.7
Ibm Aix 6.1.8
Ibm Aix 6.1.9
1 Article
7.8
CVSSv3
CVE-2017-1692
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM X-Force ID: 134067.
Ibm Aix 5.3
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
7.3
CVSSv3
CVE-2017-1541
A flaw in the AIX 5.3, 6.1, 7.1, and 7.2 JRE/SDK installp and updatep packages prevented the java.security, java.policy and javaws.policy files from being updated correctly. IBM X-Force ID: 130809.
Ibm Aix 5.3
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
7.8
CVSSv3
CVE-2016-8972
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011.
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.0
Ibm Vios 2.2.0.11
Ibm Vios 2.2.0.12
Ibm Vios 2.2.1.1
Ibm Vios 2.2.1.3
Ibm Vios 2.2.0.10
Ibm Vios 2.2.3.2
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.4
Ibm Vios 2.2.1.5
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.4
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.4
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
Ibm Vios 2.2.2.3
1 EDB exploit
7.8
CVSSv3
CVE-2016-6079
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM APARs: IV88658, IV87981, IV88419, IV87640, IV88053.
Ibm Aix 5.3
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.0
Ibm Vios 2.2.0.11
Ibm Vios 2.2.0.12
Ibm Vios 2.2.1.1
Ibm Vios 2.2.1.3
Ibm Vios 2.2.0.10
Ibm Vios 2.2.3.2
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.4
Ibm Vios 2.2.1.5
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.4
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.4
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
1 EDB exploit
7.8
CVSSv3
CVE-2017-1093
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges.
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
7.8
CVSSv3
CVE-2016-3053
IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges.
Ibm Aix
1 EDB exploit
6.5
CVSSv3
CVE-2016-6038
Directory traversal vulnerability in Eclipse Help in IBM Tivoli Lightweight Infrastructure (aka LWI), as used in AIX 5.3, 6.1, and 7.1, allows remote authenticated users to read arbitrary files via a crafted URL.
Ibm Aix 5.3
Ibm Aix 7.1
Ibm Aix 6.1
3.7
CVSSv3
CVE-2016-0266
IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x do not default to the latest TLS version, which makes it easier for man-in-the-middle malicious users to obtain sensitive information via unspecified vectors.
Ibm Vios 2.2.0.13
Ibm Aix 5.3
Ibm Vios 2.2.1.0
Ibm Vios 2.2.0.11
Ibm Aix 7.1
Ibm Vios 2.2.0.12
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Vios 2.2.1.1
Ibm Vios 2.2.1.3
Ibm Vios 2.2.0.10
Ibm Vios 2.2.3.2
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.4
Ibm Vios 2.2.1.5
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.4
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.4
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »