语言:
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004834
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004836
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004837
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004854
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004860
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004861
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004867
严重性: High
ID: 84401
文件名: ibm_storwize_1_5_0_2.nasl
版本: 1.10
类型: remote
系列: Misc.
发布时间: 2015/6/26
最近更新时间: 2019/11/22
支持的传感器: Nessus
风险因素: Medium
分数: 5.9
风险因素: High
基本分数: 9.3
时间分数: 7.7
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2014-1557
CPE: cpe:/h:ibm:storwize_unified_v7000, cpe:/h:ibm:storwize_v7000, cpe:/h:ibm:storwize_v5000, cpe:/h:ibm:storwize_v3700, cpe:/h:ibm:storwize_v3500, cpe:/h:ibm:san_volume_controller, cpe:/a:ibm:storwize_v7000_unified_software, cpe:/a:ibm:storwize_v7000_software, cpe:/a:ibm:storwize_v5000_software, cpe:/a:ibm:storwize_v3700_software, cpe:/a:ibm:storwize_v3500_software, cpe:/a:ibm:san_volume_controller_software
必需的 KB 项: Host/IBM/Storwize/version, Host/IBM/Storwize/machine_major, Host/IBM/Storwize/display_name
可利用: true
易利用性: Exploits are available
补丁发布日期: 2015/7/15
漏洞发布日期: 2007/1/3
Core Impact
Metasploit (Apache Struts ClassLoader Manipulation Remote Code Execution)
CVE: CVE-2007-6750, CVE-2013-4286, CVE-2013-4322, CVE-2014-0075, CVE-2014-0094, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0178, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557, CVE-2014-3077, CVE-2014-3493, CVE-2014-4811
BID: 21865, 65767, 65773, 65999, 67667, 67668, 67669, 67671, 67686, 68150, 68814, 68822, 68824, 69771, 69773
CERT: 719225