cvelist/2014/2xxx/CVE-2014-2610.json

87 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:13:15 +00:00
"CVE_data_meta": {
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2610",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:13:15 +00:00
"lang": "eng",
"value": "Directory traversal vulnerability in the Content Acceleration Pack (CAP) web application in HP Executive Scorecard 9.40 and 9.41 allows remote authenticated users to execute arbitrary code by uploading an executable file, aka ZDI-CAN-2117."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:13:15 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "59363",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59363"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-14-209/",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-14-209/"
},
{
"name": "68093",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68093"
},
{
"name": "1030439",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030439"
},
{
"name": "SSRT101435",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04341295"
},
{
"name": "HPSBMU03048",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04341295"
}
]
}
}