mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "hp-security-alert@hp.com",
|
|
"ID": "CVE-2014-2610",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in the Content Acceleration Pack (CAP) web application in HP Executive Scorecard 9.40 and 9.41 allows remote authenticated users to execute arbitrary code by uploading an executable file, aka ZDI-CAN-2117."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "59363",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/59363"
|
|
},
|
|
{
|
|
"name": "http://zerodayinitiative.com/advisories/ZDI-14-209/",
|
|
"refsource": "MISC",
|
|
"url": "http://zerodayinitiative.com/advisories/ZDI-14-209/"
|
|
},
|
|
{
|
|
"name": "68093",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/68093"
|
|
},
|
|
{
|
|
"name": "1030439",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1030439"
|
|
},
|
|
{
|
|
"name": "SSRT101435",
|
|
"refsource": "HP",
|
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04341295"
|
|
},
|
|
{
|
|
"name": "HPSBMU03048",
|
|
"refsource": "HP",
|
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04341295"
|
|
}
|
|
]
|
|
}
|
|
} |