Логотип exploitDog
bind:CVE-2017-4984
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-4984

Количество 3

Количество 3

nvd логотип

CVE-2017-4984

больше 8 лет назад

In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-vc6c-mcjw-3qvq

больше 3 лет назад

In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2017-01865

больше 8 лет назад

Уязвимость систем хранения данных VNX1 и VNX2, вызванная отсутствием мер по очистке входных данных и позволяющая нарушителю получить привилегии суперпользователя

CVSS2: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-4984

In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.

CVSS3: 9.8
4%
Низкий
больше 8 лет назад
github логотип
GHSA-vc6c-mcjw-3qvq

In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, an unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system, aka remote code execution.

CVSS3: 9.8
4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2017-01865

Уязвимость систем хранения данных VNX1 и VNX2, вызванная отсутствием мер по очистке входных данных и позволяющая нарушителю получить привилегии суперпользователя

CVSS2: 10
4%
Низкий
больше 8 лет назад

Уязвимостей на страницу