Unix Vulnérabilités

Chronologie

Version

4.08
4.0b6
4.0a4
4.0c4
4.0d4

Contre-mesures

Official Fix18
Temporary Fix0
Workaround12
Unavailable0
Not Defined46

Exploitabilité

High2
Functional0
Proof-of-Concept28
Unproven0
Not Defined46

Vecteur d'accès

Not Defined0
Physical0
Local48
Adjacent0
Network28

Authentification

Not Defined0
High2
Low32
None42

Interaction de l'utilisateur

Not Defined0
Required4
None72

C3BM Index

CVSSv3 Base

≤10
≤20
≤30
≤48
≤56
≤624
≤78
≤84
≤96
≤1020

CVSSv3 Temp

≤10
≤20
≤30
≤48
≤522
≤614
≤72
≤86
≤914
≤1010

VulDB

≤10
≤20
≤30
≤410
≤56
≤622
≤78
≤84
≤96
≤1020

NVD

≤10
≤20
≤30
≤40
≤50
≤62
≤74
≤80
≤90
≤100

CNA

≤10
≤20
≤30
≤40
≤50
≤60
≤72
≤80
≤90
≤100

Fournisseur

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploiter 0 jour

<1k14
<2k22
<5k30
<10k4
<25k4
<50k2
<100k0
≥100k0

Exploiter aujourd'hui

<1k72
<2k0
<5k2
<10k2
<25k0
<50k0
<100k0
≥100k0

Exploiter le volume du marché

🔴 CTI Activités

Affected Versions (108): 1.0, 1.5, 2.1p2a, 3, 3.2, 3.2g, 4.0, 4.0a, 4.0b, 4.0c, 4.0d, 4.0e, 4.0f, 4.1, 4.2, 4.3, 5.0, 5.1, 5.1a, 5.1b-4, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 5.10, 5.11, 5.12, 5.13, 5.14, 5.15, 5.16, 5.17, 5.18, 5.19, 5.20, 5.21, 5.22, 5.23, 5.24, 5.25, 5.26, 5.27, 5.28, 5.29, 5.30, 5.31, 5.32, 5.33, 5.34, 5.35, 5.36, 5.37, 5.38, 5.39, 5.40, 5.41, 5.42, 5.43, 5.44, 5.45, 6, 6.1, 6.2, 6.3, 6.3.1, 304.0, 304.1, 304.2, 304.3, 304.4, 304.5, 304.6, 304.7, 304.8, 304.9, 304.10, 304.11, 304.12, 304.13, 304.14, 304.15, 304.16, 304.17, 304.18, 304.19, 304.20, 304.21, 304.22, 304.23, 304.24, 304.25, 304.26, 304.27, 304.28, 304.29, 304.30, 304.31, Mu02, R4.20mu06, System V386 3.2 Operating System, System V386 3.2 Operating System 2, System V386 3.2 Operating System 4, V4.0, V4.0d

Link to Product Website: https://www.ibm.com/

Type de logiciel: Operating System

65 plus d'entrées ne sont pas affichées

Do you need the next level of professionalism?

Upgrade your account now!