cvelist/2015/6xxx/CVE-2015-6459.json

73 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2015-6459",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Absolute path traversal vulnerability in the download feature in FileDownloadServlet in GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 allows remote attackers to read or delete arbitrary files via a full pathname."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-15-439/",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://zerodayinitiative.com/advisories/ZDI-15-439/"
},
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03"
},
{
"name" : "http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9"
}
]
}
}