Lucene search

K
nvd[email protected]NVD:CVE-2014-7169
HistorySep 25, 2014 - 1:55 a.m.

CVE-2014-7169

2014-09-2501:55:04
CWE-78
web.nvd.nist.gov
10

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.974

Percentile

99.9%

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

Affected configurations

Nvd
Node
gnubashRange4.3
Node
aristaeosRange4.9.04.9.12
OR
aristaeosRange4.10.04.10.9
OR
aristaeosRange4.11.04.11.11
OR
aristaeosRange4.12.04.12.9
OR
aristaeosRange4.13.04.13.9
OR
aristaeosRange4.14.04.14.4f
Node
oraclelinuxMatch4
OR
oraclelinuxMatch5-
OR
oraclelinuxMatch6-
Node
qnapqtsRange<4.1.1
OR
qnapqtsMatch4.1.1-
OR
qnapqtsMatch4.1.1build_0927
Node
mageiamageiaMatch3.0
OR
mageiamageiaMatch4.0
Node
redhatgluster_storage_server_for_on-premiseMatch2.1
OR
redhatvirtualizationMatch3.4
OR
redhatenterprise_linuxMatch4.0
OR
redhatenterprise_linuxMatch5.0
OR
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linux_desktopMatch5.0
OR
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch5.9
OR
redhatenterprise_linux_eusMatch6.4
OR
redhatenterprise_linux_eusMatch6.5
OR
redhatenterprise_linux_eusMatch7.3
OR
redhatenterprise_linux_eusMatch7.4
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_eusMatch7.6
OR
redhatenterprise_linux_eusMatch7.7
OR
redhatenterprise_linux_for_ibm_z_systemsMatch5.9_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch6.4_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch6.5_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch7.3_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch7.4_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch7.5_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch7.6_s390x
OR
redhatenterprise_linux_for_ibm_z_systemsMatch7.7_s390x
OR
redhatenterprise_linux_for_power_big_endianMatch5.0_ppc
OR
redhatenterprise_linux_for_power_big_endianMatch5.9_ppc
OR
redhatenterprise_linux_for_power_big_endianMatch6.0_ppc64
OR
redhatenterprise_linux_for_power_big_endianMatch6.4_ppc64
OR
redhatenterprise_linux_for_power_big_endianMatch7.0_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch6.5_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch7.3_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch7.4_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch7.5_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch7.6_ppc64
OR
redhatenterprise_linux_for_power_big_endian_eusMatch7.7_ppc64
OR
redhatenterprise_linux_for_scientific_computingMatch6.0
OR
redhatenterprise_linux_for_scientific_computingMatch7.0
OR
redhatenterprise_linux_serverMatch5.0
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch5.6
OR
redhatenterprise_linux_server_ausMatch5.9
OR
redhatenterprise_linux_server_ausMatch6.2
OR
redhatenterprise_linux_server_ausMatch6.4
OR
redhatenterprise_linux_server_ausMatch6.5
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_ausMatch7.7
OR
redhatenterprise_linux_server_from_rhuiMatch5.0
OR
redhatenterprise_linux_server_from_rhuiMatch6.0
OR
redhatenterprise_linux_server_from_rhuiMatch7.0
OR
redhatenterprise_linux_server_tusMatch6.5
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.7
OR
redhatenterprise_linux_workstationMatch5.0
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
susestudio_onsiteMatch1.3
OR
opensuseopensuseMatch12.3
OR
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2
OR
suselinux_enterprise_desktopMatch11sp3
OR
suselinux_enterprise_desktopMatch12-
OR
suselinux_enterprise_serverMatch10sp3ltss
OR
suselinux_enterprise_serverMatch10sp4ltss
OR
suselinux_enterprise_serverMatch11sp1ltss-
OR
suselinux_enterprise_serverMatch11sp2ltss
OR
suselinux_enterprise_serverMatch11sp3-
OR
suselinux_enterprise_serverMatch11sp3vmware
OR
suselinux_enterprise_serverMatch12-
OR
suselinux_enterprise_software_development_kitMatch11sp3
OR
suselinux_enterprise_software_development_kitMatch12-
Node
debiandebian_linuxMatch7.0
Node
ibminfosphere_guardium_database_activity_monitoringMatch8.2
OR
ibminfosphere_guardium_database_activity_monitoringMatch9.0
OR
ibminfosphere_guardium_database_activity_monitoringMatch9.1
OR
ibmpureapplication_systemRange1.0.0.01.0.0.4
OR
ibmpureapplication_systemRange1.1.0.01.1.0.4
OR
ibmpureapplication_systemMatch2.0.0.0
OR
ibmqradar_risk_managerMatch7.1.0
OR
ibmqradar_security_information_and_event_managerMatch7.1.0
OR
ibmqradar_security_information_and_event_managerMatch7.1.0mr1
OR
ibmqradar_security_information_and_event_managerMatch7.1.0mr2
OR
ibmqradar_security_information_and_event_managerMatch7.1.1-
OR
ibmqradar_security_information_and_event_managerMatch7.1.1p1
OR
ibmqradar_security_information_and_event_managerMatch7.1.1p2
OR
ibmqradar_security_information_and_event_managerMatch7.1.1p3
OR
ibmqradar_security_information_and_event_managerMatch7.1.2-
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p1
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p10
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p11
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p12
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p13
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p2
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p3
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p4
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p5
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p6
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p7
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p8
OR
ibmqradar_security_information_and_event_managerMatch7.1.2p9
OR
ibmqradar_security_information_and_event_managerMatch7.2
OR
ibmqradar_security_information_and_event_managerMatch7.2.0-
OR
ibmqradar_security_information_and_event_managerMatch7.2.0p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.0p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.0p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.1-
OR
ibmqradar_security_information_and_event_managerMatch7.2.1p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.1p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.1p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.2-
OR
ibmqradar_security_information_and_event_managerMatch7.2.2p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.2p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.2p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.2p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.3-
OR
ibmqradar_security_information_and_event_managerMatch7.2.3p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.3p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.3p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.3p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.4-
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p5
OR
ibmqradar_security_information_and_event_managerMatch7.2.4p6
OR
ibmqradar_security_information_and_event_managerMatch7.2.5-
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p5
OR
ibmqradar_security_information_and_event_managerMatch7.2.5p6
OR
ibmqradar_security_information_and_event_managerMatch7.2.6-
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p5
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p6
OR
ibmqradar_security_information_and_event_managerMatch7.2.6p7
OR
ibmqradar_security_information_and_event_managerMatch7.2.7-
OR
ibmqradar_security_information_and_event_managerMatch7.2.7p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.7p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.7p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.7p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.8-
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p1
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p10
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p11
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p12
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p13
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p14
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p15
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p16
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p2
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p3
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p4
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p5
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p6
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p7
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p8
OR
ibmqradar_security_information_and_event_managerMatch7.2.8p9
OR
ibmqradar_security_information_and_event_managerMatch7.2.8.15
OR
ibmqradar_security_information_and_event_managerMatch7.2.9
OR
ibmqradar_vulnerability_managerMatch7.2.0
OR
ibmqradar_vulnerability_managerMatch7.2.1
OR
ibmqradar_vulnerability_managerMatch7.2.2
OR
ibmqradar_vulnerability_managerMatch7.2.3
OR
ibmqradar_vulnerability_managerMatch7.2.4
OR
ibmqradar_vulnerability_managerMatch7.2.6p1
OR
ibmqradar_vulnerability_managerMatch7.2.6p2
OR
ibmqradar_vulnerability_managerMatch7.2.6p3
OR
ibmqradar_vulnerability_managerMatch7.2.6p4
OR
ibmqradar_vulnerability_managerMatch7.2.6p5
OR
ibmqradar_vulnerability_managerMatch7.2.6p6
OR
ibmqradar_vulnerability_managerMatch7.2.6p7
OR
ibmqradar_vulnerability_managerMatch7.2.8-
OR
ibmqradar_vulnerability_managerMatch7.2.8p1
OR
ibmqradar_vulnerability_managerMatch7.2.8p10
OR
ibmqradar_vulnerability_managerMatch7.2.8p11
OR
ibmqradar_vulnerability_managerMatch7.2.8p12
OR
ibmqradar_vulnerability_managerMatch7.2.8p13
OR
ibmqradar_vulnerability_managerMatch7.2.8p14
OR
ibmqradar_vulnerability_managerMatch7.2.8p15
OR
ibmqradar_vulnerability_managerMatch7.2.8p16
OR
ibmqradar_vulnerability_managerMatch7.2.8p17
OR
ibmqradar_vulnerability_managerMatch7.2.8p2
OR
ibmqradar_vulnerability_managerMatch7.2.8p3
OR
ibmqradar_vulnerability_managerMatch7.2.8p4
OR
ibmqradar_vulnerability_managerMatch7.2.8p5
OR
ibmqradar_vulnerability_managerMatch7.2.8p6
OR
ibmqradar_vulnerability_managerMatch7.2.8p7
OR
ibmqradar_vulnerability_managerMatch7.2.8p8
OR
ibmqradar_vulnerability_managerMatch7.2.8p9
OR
ibmsmartcloud_entry_applianceMatch2.3.0
OR
ibmsmartcloud_entry_applianceMatch2.4.0
OR
ibmsmartcloud_entry_applianceMatch3.1.0
OR
ibmsmartcloud_entry_applianceMatch3.2.0
OR
ibmsmartcloud_provisioningMatch2.1.0
OR
ibmsoftware_defined_network_for_virtual_environmentsRange<1.2.1kvm
OR
ibmsoftware_defined_network_for_virtual_environmentsRange<1.2.1openflow
OR
ibmsoftware_defined_network_for_virtual_environmentsRange<1.2.1vmware
OR
ibmstarter_kit_for_cloudMatch2.2.0
OR
ibmworkload_deployerRange3.1.03.1.0.7
OR
ibmsecurity_access_manager_for_mobile_8.0_firmwareMatch8.0.0.1
OR
ibmsecurity_access_manager_for_mobile_8.0_firmwareMatch8.0.0.2
OR
ibmsecurity_access_manager_for_mobile_8.0_firmwareMatch8.0.0.3
OR
ibmsecurity_access_manager_for_mobile_8.0_firmwareMatch8.0.0.5
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.1
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.2
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.3
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.4
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.5
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.6
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.7
OR
ibmsecurity_access_manager_for_web_7.0_firmwareMatch7.0.0.8
OR
ibmsecurity_access_manager_for_web_8.0_firmwareMatch8.0.0.2
OR
ibmsecurity_access_manager_for_web_8.0_firmwareMatch8.0.0.3
OR
ibmsecurity_access_manager_for_web_8.0_firmwareMatch8.0.0.5
Node
ibmstorwize_v7000_firmwareRange1.1.0.01.4.3.5
OR
ibmstorwize_v7000_firmwareRange1.5.0.01.5.0.4
OR
ibmstorwize_v7000_firmwareRange7.2.0.07.2.0.9
OR
ibmstorwize_v7000_firmwareRange7.3.0.07.3.0.7
AND
ibmstorwize_v7000Match-
Node
ibmstorwize_v5000_firmwareRange1.1.0.07.1.0.11
OR
ibmstorwize_v5000_firmwareRange7.2.0.07.2.0.9
OR
ibmstorwize_v5000_firmwareRange7.3.0.07.3.0.7
AND
ibmstorwize_v5000Match-
Node
ibmstorwize_v3700_firmwareRange1.1.0.07.1.0.11
OR
ibmstorwize_v3700_firmwareRange7.2.0.07.2.0.9
OR
ibmstorwize_v3700_firmwareRange7.3.0.07.3.0.7
AND
ibmstorwize_v3700Match-
Node
ibmstorwize_v3500_firmwareRange1.1.0.07.1.0.11
OR
ibmstorwize_v3500_firmwareRange7.2.0.07.2.0.9
OR
ibmstorwize_v3500_firmwareRange7.3.0.07.3.0.7
AND
ibmstorwize_v3500Match-
Node
ibmflex_system_v7000_firmwareRange1.1.0.07.1.0.11
OR
ibmflex_system_v7000_firmwareRange7.2.0.07.2.0.9
OR
ibmflex_system_v7000_firmwareRange7.3.0.07.3.0.7
AND
ibmflex_system_v7000Match-
Node
ibmsan_volume_controller_firmwareRange1.1.0.07.1.0.11
OR
ibmsan_volume_controller_firmwareRange7.2.0.07.2.0.9
OR
ibmsan_volume_controller_firmwareRange7.3.0.07.3.0.7
AND
ibmsan_volume_controllerMatch-
Node
ibmstn6500_firmwareRange3.8.0.03.8.0.07
OR
ibmstn6500_firmwareRange3.9.1.03.9.1.08
OR
ibmstn6500_firmwareRange4.1.2.04.1.2.06
AND
ibmstn6500Match-
Node
ibmstn6800_firmwareRange3.8.0.03.8.0.07
OR
ibmstn6800_firmwareRange3.9.1.03.9.1.08
OR
ibmstn6800_firmwareRange4.1.2.04.1.2.06
AND
ibmstn6800Match-
Node
ibmstn7800_firmwareRange3.8.0.03.8.0.07
OR
ibmstn7800_firmwareRange3.9.1.03.9.1.08
OR
ibmstn7800_firmwareRange4.1.2.04.1.2.06
AND
ibmstn7800Match-
Node
canonicalubuntu_linuxMatch10.04-
OR
canonicalubuntu_linuxMatch12.04-
OR
canonicalubuntu_linuxMatch14.04esm
Node
novellzenworks_configuration_managementMatch10.3
OR
novellzenworks_configuration_managementMatch11
OR
novellzenworks_configuration_managementMatch11.1
OR
novellzenworks_configuration_managementMatch11.2
OR
novellzenworks_configuration_managementMatch11.3.0
OR
novellopen_enterprise_serverMatch2.0sp3linux_kernel
OR
novellopen_enterprise_serverMatch11.0sp2linux_kernel
Node
checkpointsecurity_gatewayRange<r77.30
Node
f5big-ip_access_policy_managerRange10.1.010.2.4
OR
f5big-ip_access_policy_managerRange11.0.011.5.1
OR
f5big-ip_access_policy_managerMatch11.6.0
OR
f5big-ip_advanced_firewall_managerRange11.3.011.5.1
OR
f5big-ip_advanced_firewall_managerMatch11.6.0
OR
f5big-ip_analyticsRange11.0.011.5.1
OR
f5big-ip_analyticsMatch11.6.0
OR
f5big-ip_application_acceleration_managerRange11.4.011.5.1
OR
f5big-ip_application_acceleration_managerMatch11.6.0
OR
f5big-ip_application_security_managerRange10.0.010.2.4
OR
f5big-ip_application_security_managerRange11.0.011.5.1
OR
f5big-ip_application_security_managerMatch11.6.0
OR
f5big-ip_edge_gatewayRange10.1.010.2.4
OR
f5big-ip_edge_gatewayRange11.0.011.3.0
OR
f5big-ip_global_traffic_managerRange10.0.010.2.4
OR
f5big-ip_global_traffic_managerRange11.0.011.5.1
OR
f5big-ip_global_traffic_managerMatch11.6.0
OR
f5big-ip_link_controllerRange10.0.010.2.4
OR
f5big-ip_link_controllerRange11.0.011.5.1
OR
f5big-ip_link_controllerMatch11.6.0
OR
f5big-ip_local_traffic_managerRange10.0.010.2.4
OR
f5big-ip_local_traffic_managerRange11.0.011.5.1
OR
f5big-ip_local_traffic_managerMatch11.6.0
OR
f5big-ip_policy_enforcement_managerRange11.3.011.5.1
OR
f5big-ip_policy_enforcement_managerMatch11.6.0
OR
f5big-ip_protocol_security_moduleRange10.0.010.2.4
OR
f5big-ip_protocol_security_moduleRange11.0.011.4.1
OR
f5big-ip_wan_optimization_managerRange10.0.010.2.4
OR
f5big-ip_wan_optimization_managerRange11.0.011.3.0
OR
f5big-ip_webacceleratorRange10.0.010.2.4
OR
f5big-ip_webacceleratorRange11.0.011.3.0
OR
f5big-iq_cloudRange4.0.04.4.0
OR
f5big-iq_deviceRange4.2.04.4.0
OR
f5big-iq_securityRange4.0.04.4.0
OR
f5enterprise_managerRange2.1.02.3.0
OR
f5enterprise_managerRange3.0.03.1.1
OR
f5traffix_signaling_delivery_controllerRange4.0.04.0.5
OR
f5traffix_signaling_delivery_controllerMatch3.3.2
OR
f5traffix_signaling_delivery_controllerMatch3.4.1
OR
f5traffix_signaling_delivery_controllerMatch3.5.1
OR
f5traffix_signaling_delivery_controllerMatch4.1.0
Node
f5arx_firmwareRange6.0.06.4.0
AND
f5arxMatch-
Node
citrixnetscaler_sdx_firmwareRange<9.3.67.5r1
OR
citrixnetscaler_sdx_firmwareRange1010.1.129.11r1
OR
citrixnetscaler_sdx_firmwareRange10.510.5.52.11r1
AND
citrixnetscaler_sdxMatch-
Node
applemac_os_xRange10.0.010.10.0
Node
vmwarevcenter_server_applianceMatch5.0
OR
vmwarevcenter_server_applianceMatch5.0update_1
OR
vmwarevcenter_server_applianceMatch5.0update_2
OR
vmwarevcenter_server_applianceMatch5.1
OR
vmwarevcenter_server_applianceMatch5.1update_1
OR
vmwarevcenter_server_applianceMatch5.1update_2
OR
vmwarevcenter_server_applianceMatch5.5-
OR
vmwarevcenter_server_applianceMatch5.5update_1
OR
vmwareesxMatch4.0
OR
vmwareesxMatch4.1
VendorProductVersionCPE
gnubash*cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*
aristaeos*cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
oraclelinux4cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
oraclelinux5cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
oraclelinux6cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
qnapqts*cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
qnapqts4.1.1cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
qnapqts4.1.1cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*
mageiamageia3.0cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
mageiamageia4.0cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 3081

References

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.974

Percentile

99.9%