Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 6.1 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2018-1655
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748.
Ibm Aix 7.2
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
801
VMScore
CVE-2018-1383
A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117.
Ibm Aix 7.2.2
Ibm Aix 7.1.3
Ibm Aix 7.1.1
Ibm Aix 6.1.5
Ibm Aix 6.1.7
Ibm Aix 6.1
Ibm Aix 6.1.1
Ibm Aix 6.1.2
Ibm Aix 6.1.3
Ibm Aix 7.2.1
Ibm Aix 7.2
Ibm Aix 7.1.5
Ibm Aix 7.1.4
Ibm Aix 6.1.9
Ibm Aix 7.1.2
Ibm Aix 7.1
Ibm Aix 6.1.4
Ibm Aix 6.1.6
Ibm Aix 6.1.8
1 Article
641
VMScore
CVE-2017-1692
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM X-Force ID: 134067.
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
668
VMScore
CVE-2017-1541
A flaw in the AIX 5.3, 6.1, 7.1, and 7.2 JRE/SDK installp and updatep packages prevented the java.security, java.policy and javaws.policy files from being updated correctly. IBM X-Force ID: 130809.
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
725
VMScore
CVE-2016-8972
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011.
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Vios 2.2.0.11
Ibm Vios 2.2.0.12
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.6
Ibm Vios 2.2.2.70
Ibm Vios 2.2.3.0
Ibm Vios 2.2.3.52
Ibm Vios 2.2.3.60
Ibm Vios 2.2.4.23
Ibm Vios 2.2.4.30
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.0
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.0
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.2
Ibm Vios 2.2.3.70
Ibm Vios 2.2.3.80
1 EDB exploit
725
VMScore
CVE-2016-6079
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM APARs: IV88658, IV87981, IV88419, IV87640, IV88053.
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Aix 7.2
Ibm Aix 5.3
Ibm Vios 2.2.1.0
Ibm Vios 2.2.1.1
Ibm Vios 2.2.2.1
Ibm Vios 2.2.2.2
Ibm Vios 2.2.3.2
Ibm Vios 2.2.3.3
Ibm Vios 2.2.3.80
Ibm Vios 2.2.4.0
Ibm Vios 2.2.0.10
Ibm Vios 2.2.0.11
Ibm Vios 2.2.1.5
Ibm Vios 2.2.1.6
Ibm Vios 2.2.1.7
Ibm Vios 2.2.2.6
Ibm Vios 2.2.2.70
Ibm Vios 2.2.3.51
Ibm Vios 2.2.3.52
Ibm Vios 2.2.4.22
1 EDB exploit
641
VMScore
CVE-2017-1093
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges.
Ibm Aix 7.2
Ibm Aix 6.1
Ibm Aix 7.1
725
VMScore
CVE-2016-3053
IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges.
Ibm Aix
1 EDB exploit
356
VMScore
CVE-2016-6038
Directory traversal vulnerability in Eclipse Help in IBM Tivoli Lightweight Infrastructure (aka LWI), as used in AIX 5.3, 6.1, and 7.1, allows remote authenticated users to read arbitrary files via a crafted URL.
Ibm Aix 6.1
Ibm Aix 5.3
Ibm Aix 7.1
383
VMScore
CVE-2016-0281
The mustendd driver in IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x, when the jumbo_frames feature is not enabled, allows remote malicious users to cause a denial of service (FC1763 or FC5899 adapter crash) via crafted packets.
Ibm Aix 7.2
Ibm Aix 5.3
Ibm Aix 6.1
Ibm Aix 7.1
Ibm Vios 2.2.3.4
Ibm Vios 2.2.2.2
Ibm Vios 2.2.2.1
Ibm Vios 2.2.1.4
Ibm Vios 2.2.1.3
Ibm Vios 2.2.0.13
Ibm Vios 2.2.0.12
Ibm Vios 2.2.3.3
Ibm Vios 2.2.3.2
Ibm Vios 2.2.2.0
Ibm Vios 2.2.1.9
Ibm Vios 2.2.1.1
Ibm Vios 2.2.0.11
Ibm Vios 2.2.3.1
Ibm Vios 2.2.3.0
Ibm Vios 2.2.2.5
Ibm Vios 2.2.1.8
Ibm Vios 2.2.1.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »