CVE-2014-5210
Published Aug 21, 2014
Last updated 10 years ago
Overview
- Description
- The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7623E6-C31A-4B94-84A7-44B4E15E4EC9", "versionEndIncluding": "4.6.1" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AC1742C-AED7-43E4-8E32-B42D1667BF5A" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F80E48B-F0E1-4B27-95AC-0E51C9226BBB" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "457DBA44-C1F8-41F5-9D52-CCC08E5091A3" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFC70AC-29B9-417E-A57C-9DB28D40FDDB" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC15D313-4971-429C-BE74-29D35830D87D" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FC3013D-06C7-4FEA-83B2-70CB6DDF4F64" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4442E047-9A5B-4C26-95E9-D4B21477BB1B" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DD2C75-EF88-4A2D-B086-864AE0E9673B" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3ABC1EE-3E54-48AF-95C1-ED9790527545" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C1E268F-F5F8-46DC-B84D-B59B266B0107" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA1B7761-3BA5-4840-9DCA-67F779A54258" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D7CC06-1627-4B3C-91CC-E54033418157" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F699448-40D9-46AD-978E-19CFC27B5D3E" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A841097-4529-44BF-802F-A6E7844110DE" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02991762-92A2-4E4A-AE1E-465470463BAC" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A3CBE8E-080B-4F90-A2AE-8BAD6E64F8ED" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEF05B6-7664-455A-98FA-A7E750867914" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE3AED6C-9982-4A47-957E-7E3AFACF9183" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F3C564-9BDF-4AB1-A289-6E89C7DDFA14" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A1E42B1-70C8-4BFD-8727-D91BFC42BFE4" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F401C06-FEF5-4EDB-9F60-A1D7D15C1930" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A075A304-E945-466A-BD6F-687DB4E0CAB6" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2EFBEEE-B52E-4D69-8A01-DE55080838AB" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC9C8686-878D-49DD-B1E9-842265B34306" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826BA62F-D64D-4740-B39F-B5AD8B14C48C" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DDAA1EB-D69E-4DDE-8931-92667C297AB7" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D7C427-DF18-48CA-B337-8AFD35FBF68A" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C05724-5D21-4D4D-B8A5-8B731250B5E3" } ], "operator": "OR" } ] } ]