Language:
http://www.nessus.org/u?67b88cb2
http://wiki.arkeia.com/index.php/Path_Traversal_Remote_Code_Execution
http://www.wdc.com/en/heartbleedupdate/
http://www.nessus.org/u?b286eb09
http://www.nessus.org/u?97c1883b
https://eprint.iacr.org/2014/140
Severity: High
ID: 74262
File Name: wd_arkeia_10_1_19_ver_check.nasl
Version: 1.9
Type: remote
Family: CGI abuses
Published: 6/2/2014
Updated: 4/25/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.3
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2014-2846
Risk Factor: High
Base Score: 7.5
Temporal Score: 7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2014-0160
CPE: cpe:/a:wdc:arkeia_virtual_appliance
Required KB Items: www/PHP, www/wd_arkeia
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 4/14/2014
Vulnerability Publication Date: 2/24/2014
CISA Known Exploited Vulnerability Due Dates: 5/25/2022
Core Impact
CVE: CVE-2014-0160, CVE-2014-2846
CERT: 720951