Note:
This project will be discontinued after December 13, 2021. [more]
Product:
San_volume_controller_software
(Ibm)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-09-11 | CVE-2014-4811 | IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address. | San_volume_controller_software, Storwize_v3500, Storwize_v3700, Storwize_v5000, Storwize_v7000 | N/A | ||
2014-03-29 | CVE-2014-0880 | IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address. | Flex_system_v7000, Flex_system_v7000_software, San_volume_controller, San_volume_controller_software, Storwize_v3500, Storwize_v3500_software, Storwize_v3700, Storwize_v3700_software, Storwize_v5000, Storwize_v5000_software, Storwize_v7000, Storwize_v7000_software | N/A | ||
2013-02-19 | CVE-2012-6354 | The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets. | San_volume_controller_software, Storwize_v7000 | N/A |