Executive Summary

Informations
Name CVE-2014-5210 First vendor Publication 2014-08-21
Vendor Cve Last vendor Modification 2014-08-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5210

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 30

Snort® IPS/IDS

Date Description
2014-11-16 AlienVault OSSIM remote_task command injection attempt
RuleID : 31823 - Revision : 4 - Type : SERVER-WEBAPP

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/69239
CONFIRM http://forums.alienvault.com/discussion/2690
MISC http://www.zerodayinitiative.com/advisories/ZDI-14-294/
http://www.zerodayinitiative.com/advisories/ZDI-14-295/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2021-05-04 12:33:25
  • Multiple Updates
2021-04-22 01:40:09
  • Multiple Updates
2020-05-23 01:52:44
  • Multiple Updates
2020-05-23 00:41:46
  • Multiple Updates
2014-11-16 21:25:15
  • Multiple Updates
2014-08-21 21:25:30
  • First insertion