Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 6.1.1 vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2018-1383
A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117.
Ibm Aix 6.1.3
Ibm Aix 7.1.2
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1.1
Ibm Aix 6.1
Ibm Aix 6.1.2
Ibm Aix 7.1.1
Ibm Aix 7.2.2
Ibm Aix 7.2.1
Ibm Aix 7.1.5
Ibm Aix 7.1.4
Ibm Aix 7.1.3
Ibm Aix 6.1.4
Ibm Aix 6.1.5
Ibm Aix 6.1.6
Ibm Aix 6.1.7
Ibm Aix 6.1.8
Ibm Aix 6.1.9
1 Article
NA
CVE-2011-1222
Buffer overflow in the Journal Based Backup (JBB) feature in the backup-archive client in IBM Tivoli Storage Manager (TSM) prior to 5.4.3.4, 5.5.x prior to 5.5.3, 6.x prior to 6.1.4, and 6.2.x prior to 6.2.2 on Windows and AIX allows local users to gain privileges via unspecified...
Ibm Tivoli Storage Manager
Ibm Tivoli Storage Manager 4.2
Ibm Tivoli Storage Manager 4.2.1
Ibm Tivoli Storage Manager 5.1.8
Ibm Tivoli Storage Manager 5.2.5.1
Ibm Tivoli Storage Manager 5.2.7
Ibm Tivoli Storage Manager 5.2.8
Ibm Tivoli Storage Manager 5.2.9
Ibm Tivoli Storage Manager 5.3.0
Ibm Tivoli Storage Manager 5.3.1
Ibm Tivoli Storage Manager 5.3.2
Ibm Tivoli Storage Manager 5.3.3
Ibm Tivoli Storage Manager 5.3.6.1
Ibm Tivoli Storage Manager 5.3.6.2
Ibm Tivoli Storage Manager 5.3.6.3
Ibm Tivoli Storage Manager 5.3.6.4
Ibm Tivoli Storage Manager 5.3.6.5
Ibm Tivoli Storage Manager 5.3.6.6
Ibm Tivoli Storage Manager 5.4.1
Ibm Tivoli Storage Manager 5.4.2
Ibm Tivoli Storage Manager 5.4.3.0
Ibm Tivoli Storage Manager 5.4.3.2
NA
CVE-2010-4622
Directory traversal vulnerability in WebSEAL in IBM Tivoli Access Manager for e-business 6.1.1 prior to 6.1.1-TIV-AWS-FP0001 on AIX allows remote malicious users to read arbitrary files via a %uff0e%uff0e (encoded dot dot) in a URI.
Ibm Tivoli Access Manager For E-business 6.1.1
NA
CVE-2009-3699
Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x up to and including 5.3.10 and 6.x up to and including 6.1.3, and VIOS 2.1 and previous versions, allows remote malicious users to execute arbitrary code via a long XDR string in the first ar...
Ibm Aix 5.2.0.50
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 5.3.0.20
Ibm Aix 5.3 L
Ibm Aix 5l
Ibm Aix 6.1.3
Ibm Aix 5.3.10
Ibm Aix 5.3
Ibm Aix 5
Ibm Aix 6.1.0
Ibm Vios
Ibm Aix 5.2
Ibm Aix 6.1.1
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 5.3 Ml03
Ibm Aix 5.3.9
Ibm Vios 1.5.2
Ibm Vios 1.4
Ibm Aix 5.2.0
1 EDB exploit
NA
CVE-2009-3516
gssd in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly handle the NFSv4 Kerberos credential cache, which allows local users to bypass intended access restrictions for Kerberized NFSv4 shares via unspecified vectors.
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 6.1.0
Ibm Aix 6.1.1
Ibm Aix 6.1
Ibm Aix 6.1.2
Ibm Aix 5.3.0
NA
CVE-2009-3517
nfs.ext in IBM AIX 5.3.x up to and including 5.3.9 and 6.1.0 up to and including 6.1.2 does not properly use the nfs_portmon setting, which allows remote malicious users to bypass intended access restrictions for NFSv4 shares via unspecified vectors.
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 6.1.0
Ibm Aix 6.1.1
Ibm Aix 6.1
Ibm Aix 6.1.2
Ibm Aix 5.3.0
NA
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 up to and including 5.3.10, and 6.1.0 up to and including 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote maliciou...
Ibm Aix 5.2.0.50
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 5.3.10
Ibm Aix 5.3
Ibm Aix 6.1.0
Ibm Aix 5.2
Ibm Aix 6.1.1
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 5.3.9
Ibm Aix 5.2.0
Ibm Aix 5.2.2
Ibm Aix 6.1.2
Ibm Aix 5.3.0
1 EDB exploit
NA
CVE-2009-0536
at in bos.rte.cron on IBM AIX 5.2.0, 5.3.0 up to and including 5.3.9, and 6.1.0 up to and including 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 6.1.0
Ibm Aix 6.1.1
Ibm Aix 5.3.9
Ibm Aix 5.2.0
Ibm Aix 6.1.2
Ibm Aix 5.3.0
NA
CVE-2009-0435
Unspecified vulnerability in the IBM Asynchronous I/O (aka AIO or libibmaio) library in the Java Message Service (JMS) component in IBM WebSphere Application Server (WAS) 6.1.x prior to 6.1.0.17 on AIX 5.3 allows malicious users to cause a denial of service (daemon crash) via vec...
Ibm Websphere Application Server 6.1.0
Ibm Websphere Application Server 6.1.0.0
Ibm Websphere Application Server 6.1.0.1
Ibm Websphere Application Server 6.1.0.2
Ibm Websphere Application Server 6.1.0.3
Ibm Websphere Application Server 6.1.0.4
Ibm Websphere Application Server 6.1.0.5
Ibm Websphere Application Server 6.1.0.6
Ibm Websphere Application Server 6.1.0.7
Ibm Websphere Application Server 6.1.0.8
Ibm Websphere Application Server 6.1.0.9
Ibm Websphere Application Server 6.1.0.10
Ibm Websphere Application Server 6.1.0.11
Ibm Websphere Application Server 6.1.0.12
Ibm Websphere Application Server 6.1.0.13
Ibm Websphere Application Server 6.1.0.14
Ibm Websphere Application Server 6.1.0.15
Ibm Websphere Application Server 6.1.0.16
Ibm Websphere Application Server 6.1.1
Ibm Websphere Application Server 6.1.3
Ibm Websphere Application Server 6.1.5
Ibm Websphere Application Server 6.1.6
NA
CVE-2009-0370
Multiple unspecified vulnerabilities in IBM AIX 5.2.0 up to and including 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."
Ibm Aix 5.3.8
Ibm Aix 5.3.7
Ibm Aix 5.3 L
Ibm Aix 5.3
Ibm Aix 5.2
Ibm Aix 6.1.1
Ibm Aix 5.2 L
Ibm Aix 6.1
Ibm Aix 5.3.9
Ibm Aix 5.2.2
Ibm Aix 6.1.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »