2.1
CVE-2015-4981
- EPSS 0.06%
- Published 26.10.2015 02:59:01
- Last modified 12.04.2025 10:46:40
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM General Parallel File System (GPFS) 3.5.x before 3.5.0.27 and 4.1.x before 4.1.1.2 and Spectrum Scale 4.1.1.x before 4.1.1.2 allow local users to obtain sensitive information from system memory via unspecified vectors.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ General Parallel File System Version3.5
Ibm ≫ General Parallel File System Version3.5.0.0
Ibm ≫ General Parallel File System Version3.5.0.2
Ibm ≫ General Parallel File System Version3.5.0.3
Ibm ≫ General Parallel File System Version3.5.0.4
Ibm ≫ General Parallel File System Version3.5.0.6
Ibm ≫ General Parallel File System Version3.5.0.7
Ibm ≫ General Parallel File System Version3.5.0.8
Ibm ≫ General Parallel File System Version3.5.0.9
Ibm ≫ General Parallel File System Version3.5.0.10
Ibm ≫ General Parallel File System Version3.5.0.11
Ibm ≫ General Parallel File System Version3.5.0.12
Ibm ≫ General Parallel File System Version3.5.0.13
Ibm ≫ General Parallel File System Version3.5.0.14
Ibm ≫ General Parallel File System Version3.5.0.15
Ibm ≫ General Parallel File System Version3.5.0.16
Ibm ≫ General Parallel File System Version3.5.0.17
Ibm ≫ General Parallel File System Version3.5.0.18
Ibm ≫ General Parallel File System Version3.5.0.19
Ibm ≫ General Parallel File System Version3.5.0.20
Ibm ≫ General Parallel File System Version3.5.0.21
Ibm ≫ General Parallel File System Version3.5.0.22
Ibm ≫ General Parallel File System Version3.5.0.23
Ibm ≫ General Parallel File System Version3.5.0.24
Ibm ≫ General Parallel File System Version3.5.0.25
Ibm ≫ General Parallel File System Version3.5.0.26
Ibm ≫ Spectrum Scale Version4.1.1.0
Ibm ≫ Spectrum Scale Version4.1.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.17 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.