The Fix Level Recommendation Tool Vulnerability Checker (FLRTVC) online provides security and HIPER (High Impact PERvasive) reports based on the fileset inventory of your system. The report will guide you in discovering vulnerable filesets, the affected versions, interim fixes that are installed, as well as a link to the security bulletin for further action.

FLRTVC exists as a standalone ksh script which may be downloaded from our FLRTVC Script webpage. FLRTVC uses HIPER/Security data from FLRT (aparCSV) to compare against the installed filesets (lslpp -Lcq) and interim fixes (emgr -lv3) to report your risks.

This webpage was developed based on feedback received from customers at Edge2015. We welcome your feedback on this tool and ways to improve it!
Please use the Feedback Tool and follow us on Twitter @IBMSupport for updates!

Upload LSLPP and EMGR files

Run command: lslpp -Lcq > lslpp.txt

Run command: emgr -lv3 > emgr.txt

Filter the vulnerabilities displayed in the report

Filter for filesets


Results Type

Report Name (optional)


FLRTVC Online will accept two input files, lslpp.txt (required) and emgr.txt (optional), that will be cross-examined with the aparCSV that is provided through our website. If any filesets listed in lslpp.txt are found to be within the affected versions listed in aparCSV, they will be displayed in the generated report.

Step 1) Log in to the AIX server that will be checked for vulnerabilities.

Step 2) Run the "lslpp" command: lslpp -Lcq > lslpp.txt

Step 3) (optional) Run the "emgr" command sudo emgr -lv3 > emgr.txt

Step 4) Move the files to a machine that has an internet browser.

Step 5) Upload the file(s) using the buttons of their respective type.

Step 6) (optional) Filter the filesets using a search term.

Step 7) (optional) Select an APAR type.

Step 8) Click on "Run vulnerability checker" to begin.