Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in Agent Manager in NetIQ Sentinel allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted pathname.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/58635 - | |
References | () http://www.novell.com/support/kb/doc.php?id=7015183 - | |
References | () http://www.securityfocus.com/bid/67487 - | |
References | () http://www.securitytracker.com/id/1030434 - | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-134/ - |
Information
Published : 2014-05-20 11:13
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3460
Mitre link : CVE-2014-3460
CVE.ORG link : CVE-2014-3460
JSON object : View
Products Affected
microfocus
- sentinel_agent_manager
- sentinel
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')