mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2014-3460",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in Agent Manager in NetIQ Sentinel allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted pathname."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "58635",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/58635"
|
|
},
|
|
{
|
|
"name": "1030434",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1030434"
|
|
},
|
|
{
|
|
"name": "67487",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/67487"
|
|
},
|
|
{
|
|
"name": "http://zerodayinitiative.com/advisories/ZDI-14-134/",
|
|
"refsource": "MISC",
|
|
"url": "http://zerodayinitiative.com/advisories/ZDI-14-134/"
|
|
},
|
|
{
|
|
"name": "http://www.novell.com/support/kb/doc.php?id=7015183",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.novell.com/support/kb/doc.php?id=7015183"
|
|
}
|
|
]
|
|
}
|
|
} |