This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:ibm:aix:6.1
Detail
VendorIbmFirst view 1992-03-01
ProductAixLast view2019-04-08
Version6.1TypeOs
Edition 
Language 
Update 

Activity : Overall

COMMON PLATFORM ENUMERATION : Repartition per Version

CPE NameAffected CVE
cpe:/o:ibm:aix:5.3113
cpe:/o:ibm:aix:5.294
cpe:/o:ibm:aix:6.171
cpe:/o:ibm:aix71
cpe:/o:ibm:aix:4.257
Hide | Show 45 More...
CPE NameAffected CVE
cpe:/o:ibm:aix:4.353
cpe:/o:ibm:aix:4.153
cpe:/o:ibm:aix:5.150
cpe:/o:ibm:aix:4.3.340
cpe:/o:ibm:aix:3.237
cpe:/o:ibm:aix:7.135
cpe:/o:ibm:aix:4.3.227
cpe:/o:ibm:aix:4.1.527
cpe:/o:ibm:aix:4.2.126
cpe:/o:ibm:aix:4.1.425
cpe:/o:ibm:aix:4.1.325
cpe:/o:ibm:aix:4.1.224
cpe:/o:ibm:aix:4.3.124
cpe:/o:ibm:aix:4.1.124
cpe:/o:ibm:aix:3.2.523
cpe:/o:ibm:aix:5.3.022
cpe:/o:ibm:aix:5.2.020
cpe:/o:ibm:aix:5.2_l19
cpe:/o:ibm:aix:5.3_l19
cpe:/o:ibm:aix:5.1l17
cpe:/o:ibm:aix:5.2.217
cpe:/o:ibm:aix:3.116
cpe:/o:ibm:aix:3.2.415
cpe:/o:ibm:aix:6.1.211
cpe:/o:ibm:aix:6.1.111
cpe:/o:ibm:aix:-11
cpe:/o:ibm:aix:7.210
cpe:/o:ibm:aix:2.2.19
cpe:/o:ibm:aix:6.1.08
cpe:/o:ibm:aix:1.38
cpe:/o:ibm:aix:1.2.18
cpe:/o:ibm:aix:48
cpe:/o:ibm:aix:-::~~~~x64~8
cpe:/o:ibm:aix:4.07
cpe:/o:ibm:aix:::32-bit7
cpe:/o:ibm:aix:::~~~~x64~7
cpe:/o:ibm:aix:::~~~~x86~7
cpe:/o:ibm:aix:3.2.06
cpe:/o:ibm:aix:5.2.0.546
cpe:/o:ibm:aix:4.2.06
cpe:/o:ibm:aix:5.2.0.506
cpe:/o:ibm:aix:5.3.76
cpe:/o:ibm:aix:5.3.86
cpe:/o:ibm:aix:4.3.05
cpe:/o:ibm:aix:55

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
1.92019-04-08CVE-2018-1882LocalMediumNone Requ...
4.32019-04-08CVE-2018-1853NetworkMediumNone Requ...
52019-01-23CVE-2018-1751NetworkLowNone Requ...
52019-01-16CVE-2018-20733NetworkLowNone Requ...
4.32019-01-16CVE-2015-9281NetworkMediumNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
2.12018-06-22CVE-2018-1655LocalLowNone Requ...
52018-04-03CVE-2018-8049NetworkLowNone Requ...
92018-02-13CVE-2018-1383NetworkLowRequires ...
7.22018-02-07CVE-2017-1692LocalLowNone Requ...
42018-01-16CVE-2016-0215NetworkLowRequires ...
7.52017-10-03CVE-2017-1541NetworkLowNone Requ...
7.22017-02-15CVE-2016-8972LocalLowNone Requ...
4.92017-02-15CVE-2016-8944LocalLowNone Requ...
7.22017-02-15CVE-2016-6079LocalLowNone Requ...
7.22017-02-02CVE-2017-1093LocalLowNone Requ...
2.12017-02-01CVE-2016-8981LocalLowNone Requ...
7.52017-02-01CVE-2016-8980NetworkLowRequires ...
52017-02-01CVE-2016-8977NetworkLowNone Requ...
2.12017-02-01CVE-2016-8967LocalLowNone Requ...
4.32017-02-01CVE-2016-8966NetworkMediumNone Requ...
2.12017-02-01CVE-2016-8963LocalLowNone Requ...
5.82017-02-01CVE-2016-8961NetworkMediumNone Requ...
7.22017-02-01CVE-2016-5985LocalLowNone Requ...
7.22017-02-01CVE-2016-3053LocalLowNone Requ...

CWE : Common Weakness Enumeration

%idName
31% (43)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
28% (38)CWE-264Permissions, Privileges, and Access Controls
8% (11)CWE-200Information Exposure
8% (11)CWE-20Improper Input Validation
3% (5)CWE-399Resource Management Errors
Hide | Show 16 More...
%idName
2% (4)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (4)CWE-59Improper Link Resolution Before File Access ('Link Following')
1% (2)CWE-611Information Leak Through XML External Entity File Disclosure
1% (2)CWE-362Race Condition
1% (2)CWE-255Credentials Management
1% (2)CWE-189Numeric Errors
1% (2)CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (1)CWE-601URL Redirection to Untrusted Site ('Open Redirect')
0% (1)CWE-352Cross-Site Request Forgery (CSRF)
0% (1)CWE-326Inadequate Encryption Strength
0% (1)CWE-311Missing Encryption of Sensitive Data
0% (1)CWE-310Cryptographic Issues
0% (1)CWE-287Improper Authentication
0% (1)CWE-284Access Control (Authorization) Issues
0% (1)CWE-254Security Features
0% (1)CWE-134Uncontrolled Format String

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-24Filter Failure through Buffer Overflow
Hide | Show 15 More...
idName
CAPEC-41Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-42MIME Conversion
CAPEC-44Overflow Binary Resource File
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-67String Format Overflow in syslog()
CAPEC-69Target Programs with Elevated Privileges
CAPEC-88OS Command Injection
CAPEC-92Forced Integer Overflow
CAPEC-100Overflow Buffers
CAPEC-104Cross Zone Scripting
CAPEC-123Buffer Attacks
CAPEC-133Try All Common Application Switches and Options
CAPEC-219XML Routing Detour Attacks

SAINT Exploits

DescriptionLink
rpc.ypupdated command injection vulnerabilityMore info here
System V login argument array buffer overflowMore info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
77689IBM AIX Inventory Scout Unspecified Arbitrary File Deletion
77688IBM AIX Inventory Scout Symlink Arbitrary File Manipulation
77586HP Application Lifecycle Management foundation.sh Temporary File Symlink Arbi...
77296HP Operations / Performance Agent Local Unspecified Directory Access Restrict...
77161IBM AIX Multiple System Call Parsing Local DoS
Hide | Show 20 More...
idDescription
76075IBM AIX QLogic Adapter DMA Resource Weakness Local DoS
73552IBM Tivoli Storage Manager Client Journal Based Backup (JBB) Function Overflow
73529IBM Tivoli Directory Server on AIX Anonymous DIGEST-MD5 LDAP Bind Operation R...
73501IBM Lotus Quickr Services for Lotus Domino on AIX Atom Feed Subscription Remo...
72682IBM AIX LDAP Authentication Bypass
70519IBM AIX FC SCSI Protocol Driver Timer Deallocation Local DoS
70158IBM Tivoli Access Manager for e-business WebSEAL URL Traversal Arbitrary File...
69363Hitachi EUR Multiple Products Unspecified Arbitrary Code Execution
68100IBM AIX bos.esagent Fileset sa_snap Unspecified Local File Deletion
68099IBM AIX bos.esagent Fileset sa_snap Local Overflow
67346Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M...
66576IBM AIX FTP NLST Command Crafted Parameter Core Dump Password Hash Remote Dis...
66254IBM AIX printers.rte pioout Unspecified Command-Line Option Local Overflow
65829Snare Agent Multiple Unspecified CSRF
65506IBM AIX rpc.pcnfsd Unspecified Log Function Crafted RPC Request Remote Overflow
65505IBM VIOS rpc.pcnfsd Unspecified Log Function Crafted RPC Request Remote Overflow
65504HP-UX NFS/ONCplus rpc.pcnfsd Unspecified Log Function Crafted RPC Request Rem...
65207IBM Communications Server for AIX APPC Remote DoS
64729IRIX rpc.pcnfsd Unspecified Log Function Crafted RPC Request Remote Overflow
63595IBM Systems Director Agent Multiple Script Restriction Weakness Local Privile...

ExploitDB Exploits

idDescription
33725IBM AIX 6.1.8 libodm - Arbitrary File Write
28507IBM AIX 6.1 / 7.1 - Local Root Privilege Escalation
22251AIX 3.x/4.x,Windows 95/98/2000/NT 4,SunOS 5 gethostbyname() Buffer Overflow
21180Solaris/SPARC 2.5.1/2.6/7/8 Derived 'login' Buffer Overflow Vulnerability
9645IBM AIX 5.6/6.1 _LIB_INIT_DBG Arbitrary File Overwrite via Libc Debug
Hide | Show 2 More...
idDescription
4612IBM AIX <= 5.3.0 - setlocale() Local Privilege Escalation Exploit
716Solaris 2.5.1/2.6/7/8 rlogin /bin/login - Buffer Overflow Exploit (SPARC)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2014-10-16Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2012-04-06Name : IBM DB2 Tivoli Monitoring Agent Privilege Escalation Vulnerability (Linux)
File : nvt/gb_ibm_db2_itma_priv_escalation_vuln_lin.nasl
2012-04-02Name : IBM DB2 Administration Server Buffer Overflow Vulnerability (Linux)
File : nvt/gb_ibm_db2_admin_server_bof_vuln_lin.nasl
2011-11-15Name : SendMail Mail Relay Vulnerability
File : nvt/gb_sendmail_mail_relay_vuln.nasl
2011-09-27Name : CDE ToolTalk RPC Database Server Multiple Vulnerabilities
File : nvt/secpod_tooltalk_rpc_database_server_mult_vuln.nasl
Hide | Show 20 More...
idDescription
2011-07-15Name : ICMP Timestamp Detection
File : nvt/gb_icmp_timestamps.nasl
2010-05-28Name : HP-UX Update for ONCPlus HPSBUX02523
File : nvt/gb_hp_ux_HPSBUX02523.nasl
2009-10-10Name : SLES9: Security update for Perl
File : nvt/sles9p5013510.nasl
2009-05-05Name : HP-UX Update for sendmail HPSBUX00281
File : nvt/gb_hp_ux_HPSBUX00281.nasl
2009-05-05Name : HP-UX Update for dtterm HPSBUX00309
File : nvt/gb_hp_ux_HPSBUX00309.nasl
2009-04-09Name : Mandriva Update for mplayer MDKSA-2007:192 (mplayer)
File : nvt/gb_mandriva_MDKSA_2007_192.nasl
2008-10-24Name : rpc.ypupdated remote execution
File : nvt/ypupdated_remote_exec.nasl
2008-10-24Name : SysV /bin/login buffer overflow (telnet)
File : nvt/binlogin_overflow_telnet.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200502-13 (Perl)
File : nvt/glsa_200502_13.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200410-03 (netkit-telnetd)
File : nvt/glsa_200410_03.nasl
2008-09-04Name : FreeBSD Security Advisory (FreeBSD-SA-03:19.bind.asc)
File : nvt/freebsdsa_bind.nasl
2008-09-04Name : FreeBSD Ports: bind
File : nvt/freebsd_bind.nasl
2008-09-04Name : FreeBSD Ports: perl
File : nvt/freebsd_perl.nasl
2008-01-17Name : Debian Security Advisory DSA 409-1 (bind)
File : nvt/deb_409_1.nasl
2008-01-17Name : Debian Security Advisory DSA 266-1 (krb5)
File : nvt/deb_266_1.nasl
2008-01-17Name : Debian Security Advisory DSA 272-1 (dietlibc)
File : nvt/deb_272_1.nasl
2008-01-17Name : Debian Security Advisory DSA 282-1 (glibc)
File : nvt/deb_282_1.nasl
2008-01-17Name : Debian Security Advisory DSA 070-1 (netkit-telnet)
File : nvt/deb_070_1.nasl
2008-01-17Name : Debian Security Advisory DSA 075-1 (netkit-telnet-ssl)
File : nvt/deb_075_1.nasl
2008-01-17Name : Debian Security Advisory DSA 384-1 (sendmail)
File : nvt/deb_384_1.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0154Multiple Vulnerabilities in Oracle Fusion Middleware
Severity : Category I - VMSKEY : V0061081
2015-B-0014Multiple Vulnerabilities in VMware ESXi 5.5
Severity : Category I - VMSKEY : V0058513
2015-B-0013Multiple Vulnerabilities in VMware ESXi 5.1
Severity : Category I - VMSKEY : V0058515
2015-B-0012Multiple Vulnerabilities in VMware ESXi 5.0
Severity : Category I - VMSKEY : V0058517
2013-B-0092Multiple Vulnerabilities in IBM AIX
Severity : Category I - VMSKEY : V0040107
Hide | Show 3 More...
idDescription
2012-B-0030Multiple Security Vulnerabilities in IBM DB2
Severity : Category I - VMSKEY : V0031892
2010-A-0073Multiple Vendor RPC Integer Overflow Vulnerability
Severity : Category I - VMSKEY : V0024202
2009-B-0058IBM PowerHA Cluster Management Vulnerability
Severity : Category I - VMSKEY : V0021984

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10Unix rlogin froot parameter root access attempt
RuleID : 604-community - Type : PROTOCOL-SERVICES - Revision : 14
2014-01-10Unix rlogin froot parameter root access attempt
RuleID : 604 - Type : PROTOCOL-SERVICES - Revision : 14
2014-01-10portmap ypupdated request TCP
RuleID : 591-community - Type : PROTOCOL-RPC - Revision : 21
Hide | Show 20 More...
DateDescription
2014-01-10portmap ypupdated request TCP
RuleID : 591 - Type : PROTOCOL-RPC - Revision : 21
2014-01-10portmap ttdbserv request UDP
RuleID : 588-community - Type : PROTOCOL-RPC - Revision : 27
2014-01-10portmap ttdbserv request UDP
RuleID : 588 - Type : PROTOCOL-RPC - Revision : 27
2014-01-10portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10DOS ttdbserv Solaris
RuleID : 572-community - Type : PROTOCOL-RPC - Revision : 14
2014-01-10DOS ttdbserv Solaris
RuleID : 572 - Type : PROTOCOL-RPC - Revision : 14
2014-01-10EXPLOIT ttdbserv Solaris overflow
RuleID : 571 - Type : RPC - Revision : 10
2014-01-10EXPLOIT ttdbserv solaris overflow
RuleID : 570 - Type : RPC - Revision : 12
2016-09-29XMDCP double-free attempt
RuleID : 39936 - Type : OS-SOLARIS - Revision : 2
2016-03-14XMDCP double-free attempt
RuleID : 37511 - Type : OS-SOLARIS - Revision : 2
2014-01-10PORT bounce attempt
RuleID : 3441-community - Type : PROTOCOL-FTP - Revision : 13
2014-01-10PORT bounce attempt
RuleID : 3441 - Type : PROTOCOL-FTP - Revision : 13
2014-01-10CEL overflow attempt
RuleID : 337-community - Type : PROTOCOL-FTP - Revision : 21
2014-01-10CEL overflow attempt
RuleID : 337 - Type : PROTOCOL-FTP - Revision : 21
2014-01-10login buffer non-evasive overflow attempt
RuleID : 3274-community - Type : PROTOCOL-TELNET - Revision : 14
2014-01-10login buffer non-evasive overflow attempt
RuleID : 3274 - Type : PROTOCOL-TELNET - Revision : 14
2014-12-18SSLv3 CBC client connection attempt
RuleID : 32566 - Type : POLICY-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2018-10-10Name : An open SMTP relay is running on the host.
File : internal_smtp_relay_detection.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote AIX host has a version of bellmail installed that is affected by a...
File : aix_suid_advisory_bellmail.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote AIX host has a version of bos.acct installed that is affected by a...
File : aix_suid_advisory_bos_acct.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote AIX host has a version of lquerypv installed that is affected by a...
File : aix_suid_advisory_lquerypv.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote AIX host has a version of restbyinode installed that is affected b...
File : aix_suid_advisory_restbyinode.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2018-06-28Name : The remote AIX host has a version of the rmsock command installed that is aff...
File : aix_rmsock2_advisory.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02726.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02727.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02729.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02825.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02827.nasl - Type : ACT_GATHER_INFO
2018-02-09Name : The remote AIX host is missing a security patch.
File : aix_IJ02828.nasl - Type : ACT_GATHER_INFO
2017-12-07Name : The remote host is potentially affected by an SSL/TLS vulnerability.
File : check_point_gaia_sk103683.nasl - Type : ACT_GATHER_INFO
2017-10-24Name : The remote AIX host has a version of bind installed that is affected by multi...
File : aix_bind_nettcp_advisory2.nasl - Type : ACT_GATHER_INFO
2017-09-13Name : The version of Java SDK installed on the remote AIX host is affected by multi...
File : aix_java_july2017_advisory.nasl - Type : ACT_GATHER_INFO
2017-08-03Name : The remote AIX host has a version of bellmail installed that is affected by a...
File : aix_bellmail_advisory.nasl - Type : ACT_GATHER_INFO
2017-08-03Name : The remote AIX host has a version of bellmail installed that is affected by a...
File : aix_bellmail_advisory2.nasl - Type : ACT_GATHER_INFO
2017-07-20Name : The remote database server is affected by multiple vulnerabilities.
File : oracle_rdbms_cpu_jul_2017.nasl - Type : ACT_GATHER_INFO
2017-05-02Name : The remote AIX host is missing a security patch.
File : aix_IV93624.nasl - Type : ACT_GATHER_INFO
2017-04-12Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-459.nasl - Type : ACT_GATHER_INFO
2017-01-31Name : The remote AIX host is missing a security patch.
File : aix_IV90234.nasl - Type : ACT_GATHER_INFO
2017-01-31Name : The remote AIX host is missing a security patch.
File : aix_IV91456.nasl - Type : ACT_GATHER_INFO
2017-01-31Name : The remote AIX host is missing a security patch.
File : aix_IV91487.nasl - Type : ACT_GATHER_INFO
2017-01-31Name : The remote AIX host is missing a security patch.
File : aix_IV91488.nasl - Type : ACT_GATHER_INFO
2017-01-30Name : The remote AIX host is missing a security patch.
File : aix_IV92238.nasl - Type : ACT_GATHER_INFO