Дата публикации: | 21.03.2013 |
Всего просмотров: | 948 |
Опасность: | Средняя |
Наличие исправления: | Да |
Количество уязвимостей: | 73 |
CVSSv2 рейтинг: | 6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:O/RC:C) 6 (AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:P/RL:O/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:P/RL:W/RC:C) 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:P/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 3.7 (AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:W/RC:C) 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:W/RC:C) 5 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C) 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:O/RC:C) 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:O/RC:C) 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:O/RC:C) 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:O/RC:C) |
CVE ID: |
CVE-2011-1184 CVE-2011-2204 CVE-2011-2526 CVE-2011-3026 CVE-2011-3190 CVE-2011-3375 CVE-2011-3639 CVE-2011-4317 CVE-2012-0022 CVE-2012-0053 CVE-2012-1956 CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974 CVE-2012-1975 CVE-2012-1976 CVE-2012-3956 CVE-2012-3957 CVE-2012-3958 CVE-2012-3959 CVE-2012-3960 CVE-2012-3961 CVE-2012-3962 CVE-2012-3963 CVE-2012-3964 CVE-2012-3966 CVE-2012-3967 CVE-2012-3968 CVE-2012-3969 CVE-2012-3970 CVE-2012-3972 CVE-2012-3976 CVE-2012-3978 CVE-2012-3980 CVE-2012-3982 CVE-2012-3986 CVE-2012-3988 CVE-2012-3990 CVE-2012-3991 CVE-2012-3992 CVE-2012-3993 CVE-2012-3994 CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 CVE-2012-4184 CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 CVE-2012-4193 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 CVE-2012-4201 CVE-2012-4202 CVE-2012-4207 CVE-2012-4209 CVE-2012-4210 CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-4859 CVE-2012-5081 CVE-2012-5829 CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 CVE-2012-5839 CVE-2012-5840 CVE-2012-5841 CVE-2012-5842 CVE-2012-5954 |
Вектор эксплуатации: | Удаленная |
Воздействие: |
Отказ в обслуживании Раскрытие важных данных Обход ограничений безопасности Компрометация системы |
CWE ID: | Нет данных |
Наличие эксплоита: | Нет данных |
Уязвимые продукты: | IBM Storwize V7000 Unified 1.x |
Описание: | p>IBM has acknowledged multiple vulnerabilities in Storwize V7000 Unified, which can be exploited by malicious, local users to disclose sensitive information and cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a user's system. For more information: SA44981 SA45232 (#2) SA45748 SA47411 (#2) SA47554 SA47961 SA48069 SA48119 The vulnerabilities are reported in versions 1.3.0.0 through 1.3.2.0. < |
Ссылки: | http://www.ibm.com/support/docview.wss |