ID

VAR-201404-0288


CVE

CVE-2014-0114


TITLE

Apache Struts  And other products distributed  Apache Commons BeanUtils  In  ClassLoader  Vulnerability to be manipulated

Trust: 0.8

sources: JVNDB: JVNDB-2014-002308

DESCRIPTION

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Description: Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. (CVE-2014-0114) Refer to the readme.txt file included with the patch files for installation instructions. For the stable distribution (wheezy), this problem has been fixed in version 1.2.9-5+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1.2.9-9. We recommend that you upgrade your libstruts1.2-java packages. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Apache Struts is a framework for building web applications with Java. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. (CVE-2014-0114) All struts users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using struts must be restarted for this update to take effect. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm i386: struts-1.2.9-4jpp.8.el5_10.i386.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm x86_64: struts-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm i386: struts-1.2.9-4jpp.8.el5_10.i386.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm ia64: struts-1.2.9-4jpp.8.el5_10.ia64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.ia64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.ia64.rpm struts-manual-1.2.9-4jpp.8.el5_10.ia64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ia64.rpm ppc: struts-1.2.9-4jpp.8.el5_10.ppc.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.ppc.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.ppc.rpm struts-manual-1.2.9-4jpp.8.el5_10.ppc.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ppc.rpm s390x: struts-1.2.9-4jpp.8.el5_10.s390x.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.s390x.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.s390x.rpm struts-manual-1.2.9-4jpp.8.el5_10.s390x.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.s390x.rpm x86_64: struts-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0114.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. Release Date: 2014-08-12 Last Updated: 2014-08-12 Potential Security Impact: Remote execution of arbitrary code Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP SiteScope . References: CVE-2014-0114 (SSRT101662) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP SiteScope: v11.1x, v11.2x BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-0114 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided patches for HP SiteScope to address the vulnerability. Download the patch from HP Software Support Online according to the table below. SiteScope Affected version Resolution patch details Link to download 11.1x SiteScope 11.13 Windows 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00315 SiteScope 11.13 Windows 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00316 SiteScope 11.13 Linux 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00317 SiteScope 11.13 Linux 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00318 SiteScope 11.13 Solaris 32-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00319 SiteScope 11.13 Solaris 64-bit Cumulative Fixes http://support.openview.hp.com/selfsolve/document/LID/SIS_00320 11.2x SiteScope 11.24.271 Intermediate Patch for Windows 32bit and 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00321 SiteScope 11.24.271 Intermediate Patch for Windows 32bit on 64bit http://support.openview.hp.com/selfsolve/document/LID/SIS_00322 SiteScope 11.24.271 Intermediate Patch for Linux http://support.openview.hp.com/selfsolve/document/LID/SIS_00323 SiteScope 11.24.271 Intermediate Patch for Solaris http://support.openview.hp.com/selfsolve/document/LID/SIS_00324 HISTORY Version:1 (rev.1) - 12 August 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Description: AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. - HP Device Manager 7.6.1-06 - HP XP P9000 Tiered Storage Manager 7.6.1-06 - HP XP P9000 Replication Manager 7.6.1-06 - HP XP7 Global Link Manager Software 7.6.0-02 - HP Device Manager 8.0.0-06 - HP XP P9000 Tiered Storage Manager 8.0.0-06 - HP XP P9000 Replication Manager 8.0.0-06 - HP XP7 Global Link Manager Software 8.0.0-01 HISTORY Version:1 (rev.1) - 27 October 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Description: Red Hat Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2014-0008 Synopsis: VMware vSphere product updates to third party libraries Issue date: 2014-09-09 Updated on: 2014-09-09 (Initial Advisory) CVE numbers: --- Struts --- CVE-2014-0114 --- tc-server --- CVE-2013-4590, CVE-2013-4322, and CVE-2014-0050 --- glibc --- CVE-2013-0242 and CVE-2013-1914 --- JRE --- See references - ------------------------------------------------------------------------ 1. Summary VMware has updated vSphere third party libraries 2. Relevant releases VMware vCenter Server 5.5 prior to Update 2 VMware vCenter Update Manager 5.5 prior to Update 2 VMware ESXi 5.5 without patch ESXi550-201409101-SG 3. Problem Description a. vCenter Server Apache Struts Update The Apache Struts library is updated to address a security issue. This issue may lead to remote code execution after authentication. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-0114 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server 5.5 any 5.5 Update 2 vCenter Server 5.1 any Patch Pending vCenter Server 5.0 any Patch Pending b. vCenter Server tc-server 2.9.5 / Apache Tomcat 7.0.52 updates tc-server has been updated to version 2.9.5 to address multiple security issues. This version of tc-server includes Apache Tomcat 7.0.52. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2013-4590, CVE-2013-4322, and CVE-2014-0050 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server 5.5 any 5.5 Update 2 vCenter Server 5.1 any Patch Pending vCenter Server 5.0 any Patch Pending c. Update to ESXi glibc package glibc is updated to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2013-0242 and CVE-2013-1914 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= ESXi 5.5 any ESXi550-201409101-SG ESXi 5.1 any Patch Pending ESXi 5.0 any Patch Pending d. vCenter and Update Manager, Oracle JRE 1.7 Update 55 Oracle has documented the CVE identifiers that are addressed in JRE 1.7.0 update 55 in the Oracle Java SE Critical Patch Update Advisory of April 2014. The References section provides a link to this advisory. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server 5.5 any 5.5 Update 2 vCenter Server 5.1 any not applicable * vCenter Server 5.0 any not applicable * vCenter Update Manager 5.5 any 5.5 Update 2 vCenter Update Manager 5.1 any not applicable * vCenter Update Manager 5.0 any not applicable * * this product uses the Oracle JRE 1.6.0 family * 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vCenter Server and Update Manager 5.5u2 --------------------------------------- Downloads and Documentation: https://www.vmware.com/go/download-vsphere ESXi 5.5 -------- Download: https://www.vmware.com/patchmgr/findPatch.portal 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914 JRE --- Oracle Java SE Critical Patch Update Advisory of April 2014 http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html - ------------------------------------------------------------------------ 6. Change log 2014-09-09 VMSA-2014-0008 Initial security advisory in conjunction with the release of vSphere 5.5 Update 2 on 2014-09-09. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFUD2LADEcm8Vbi9kMRAp0lAKCCB15Aa21ThBMqWRJTeYEweSVrdQCaAsNC he8AihUDo3UB9amCBiImxq0= =W0+t -----END PGP SIGNATURE----- . Thanks to the efforts of Alvaro Munoz and the HP Fortify team, the Apache Struts project team can recommend a first mitigation that is relatively simple to apply. It involves the introduction of a generic Servlet filter, adding the possibility to blacklist unacceptable request parameters based on regular expressions. Please see the corresponding HP Fortify blog entry [2] for detailed instructions. Based on this information, the Apache Struts project team recommends to apply the mitigation advice *immediately* for all Struts 1 based applications. Struts 1 has had its End-Of-Life announcement more than one year ago [3]. However, in a cross project effort the Struts team is looking for a correction or an improved mitigation path. Please stay tuned for further information regarding a solution. This is a cross-list posting. If you have questions regarding this report, please direct them to security@struts.apache.org only. [1] http://struts.apache.org/release/2.3.x/docs/s2-021.html [2] http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2J7xeaSxro [3] http://struts.apache.org/struts1eol-announcement.html -- Ren\xe9 Gielen http://twitter.com/rgielen

Trust: 2.52

sources: NVD: CVE-2014-0114 // JVNDB: JVNDB-2014-002308 // VULMON: CVE-2014-0114 // PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 126525 // PACKETSTORM: 127868 // PACKETSTORM: 154792 // PACKETSTORM: 128873 // PACKETSTORM: 126620 // PACKETSTORM: 128211 // PACKETSTORM: 126455

AFFECTED PRODUCTS

vendor:apachemodel:strutsscope:eqversion:1.2.4

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.3.8

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.2.8

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.3.5

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.2.2

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.3.10

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.2.7

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.2.9

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.1

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.2.6

Trust: 1.6

vendor:apachemodel:strutsscope:eqversion:1.0.2

Trust: 1.0

vendor:apachemodel:commons beanutilsscope:lteversion:1.9.1

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.0

Trust: 1.0

vendor:apachemodel:strutsscope:eqversion:1.x to 1.3.10

Trust: 0.8

vendor:富士通model:クラウド インフラ マネージメント ソフトウェアscope: - version: -

Trust: 0.8

vendor:富士通model:fujitsu integrated system ha database readyscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business analytics modeling server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business process manager analytics

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:mobile manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:extreme transaction processing server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:navigator explorer server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application development cycle manager

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application framework suite

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:apworks

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:business application server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:job workload server

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:service integrator

Trust: 0.8

vendor:富士通model:interstagescope:eqversion:studio

Trust: 0.8

vendor:富士通model:interstage application development cycle managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application framework suitescope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage apworksscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage business application serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage job workload serverscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage service integratorscope:eqversion: -

Trust: 0.8

vendor:富士通model:interstage studioscope:eqversion: -

Trust: 0.8

vendor:富士通model:serverviewscope:eqversion:resource orchestrator

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:analytics server

Trust: 0.8

vendor:富士通model:symfowarescope:eqversion:server

Trust: 0.8

vendor:富士通model:systemwalker service catalog managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker service quality coordinatorscope:eqversion: -

Trust: 0.8

vendor:富士通model:systemwalker software configuration managerscope:eqversion: -

Trust: 0.8

vendor:富士通model:triolescope:eqversion:cloud middle set b set

Trust: 0.8

vendor:日立model:hitachi device managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi global link managerscope:eqversion:software

Trust: 0.8

vendor:日立model:job management partner 1/performance management - web consolescope:eqversion: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- manager web option

Trust: 0.8

vendor:日立model:jp1/performance managementscope:eqversion:- web console

Trust: 0.8

vendor:日立model:hitachi replication managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tiered storage managerscope:eqversion:software

Trust: 0.8

vendor:日立model:hitachi tuning managerscope:eqversion:software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp device managerscope:eqversion: -

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp7scope:eqversion:global link manager software

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:replication manager

Trust: 0.8

vendor:ヒューレット パッカードmodel:hp xp p9000scope:eqversion:tiered storage manager

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:5.0

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:4.5

Trust: 0.8

vendor:ibmmodel:connectionsscope:eqversion:4.0

Trust: 0.8

vendor:ibmmodel:connectionsscope:lteversion:3.0.1.1

Trust: 0.8

vendor:ibmmodel:content collectorscope:eqversion:2.2

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.1.x

Trust: 0.8

vendor:ibmmodel:lotus expeditorscope:eqversion:6.2.x

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:2.0.0.2

Trust: 0.8

vendor:ibmmodel:lotus mashupsscope:eqversion:3.0.0.1

Trust: 0.8

vendor:ibmmodel:lotus quickrscope:eqversion:8.5 for websphere portal

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.2

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3

Trust: 0.8

vendor:ibmmodel:rational changescope:eqversion:5.3.1

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:8.5

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:8.0

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:7

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.1.x

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope:lteversion:ver5.75

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:pc security

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v1.0.6

Trust: 0.8

vendor:日本電気model:infocagescope:eqversion:security risk management v1.0.0 to v2.1.3

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:enterprise edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager enterprise v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager lite v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:rfid manager standard v2.0

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:standard-j edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v5.1 to v5.2

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:web edition v6.1 to v6.5

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:application server v7.1

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:developer v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotxscope:eqversion:portal v9.1

Trust: 0.8

vendor:日本電気model:webotx application serverscope:eqversion:v7.1

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v8.2 to v8.4 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx developerscope:eqversion:v9.1 to v9.2 (with developer's studio only )

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v8.3 to v8.4

Trust: 0.8

vendor:日本電気model:webotx portalscope:eqversion:v9.1

Trust: 0.8

vendor:株式会社エヌ ティ ティ データmodel:terasoluna server framework for javascope:lteversion:2.0.0.1 from 2.0.5.1

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution 6.2.1.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution asr: 49.0.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 10.1.0

Trust: 0.8

vendor:オラクルmodel:oracle communications applicationsscope:eqversion:of metasolv solution lsr: 9.4.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle adaptive access manager 11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 8.1.2

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle enterprise data quality 9.0.11

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 10.1.3.5

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 11.1.2.4

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle jdeveloper 12.1.3.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle waveset 8.1.1

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.0.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.2.1.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle weblogic portal 10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle fusion middlewarescope:eqversion:of oracle real-time decision server 11.1.1.7 (rtd platform 3.0.x)

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.5

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.1.7

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.1

Trust: 0.8

vendor:オラクルmodel:oracle identity managerscope:eqversion:11.1.2.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera contract management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 7.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.0

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.1

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.2

Trust: 0.8

vendor:オラクルmodel:oracle primavera products suitescope:eqversion:of primavera p6 enterprise project portfolio management 8.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 10.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of allocation 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of back office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 12.0.9in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of central office 8.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of clearance optimization engine 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 11.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.0 in

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 12.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of invoice matching 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 12.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of markdown optimization 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.1

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.2

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.3

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 13.4

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 14.0

Trust: 0.8

vendor:オラクルmodel:oracle retail applicationsscope:eqversion:of returns management 2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.0.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:10.3.6.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.1.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.2.0

Trust: 0.8

vendor:オラクルmodel:oracle weblogic serverscope:eqversion:12.1.3.0

Trust: 0.8

sources: JVNDB: JVNDB-2014-002308 // CNNVD: CNNVD-201404-581 // NVD: CVE-2014-0114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0114
value: HIGH

Trust: 1.0

NVD: CVE-2014-0114
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201404-581
value: HIGH

Trust: 0.6

VULMON: CVE-2014-0114
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0114
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2014-002308 // CNNVD: CNNVD-201404-581 // NVD: CVE-2014-0114

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2014-002308 // NVD: CVE-2014-0114

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 126618 // PACKETSTORM: 126525 // PACKETSTORM: 126620 // CNNVD: CNNVD-201404-581

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201404-581

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-0114

PATCH

title:Interstage Navigator Explorer Serverurl:https://issues.apache.org/jira/browse/BEANUTILS-463

Trust: 0.8

title:struts-1.2.9-4jpp.8.el5_10.srcurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=49743

Trust: 0.6

title:Red Hat: Important: Red Hat A-MQ Broker 7.5 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192995 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: libstruts1.2-java: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=96f4091aa31a0ece729fdcb110066df5

Trust: 0.1

title:Red Hat: CVE-2014-0114url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0114

Trust: 0.1

title:Red Hat: Important: Fuse 7.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182669 - Security Advisory

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been fixed in IBM Security Privileged Identity Manager Appliance.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f5bb2b180c7c77e5a02747a1f31830d9

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=81c63752a6f26433af2128b2e8c02385

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:IBM: Security Bulletin: Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=68c6989b84f14aaac220c13b754c7702

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:struts1-patchurl:https://github.com/ricedu/struts1-patch

Trust: 0.1

title: - url:https://github.com/weblegacy/struts1

Trust: 0.1

title:struts1filterurl:https://github.com/rgielen/struts1filter

Trust: 0.1

title:StrutsExampleurl:https://github.com/vikasvns2000/StrutsExample

Trust: 0.1

title:struts-miniurl:https://github.com/bingcai/struts-mini

Trust: 0.1

title:strutt-cve-2014-0114url:https://github.com/anob3it/strutt-cve-2014-0114

Trust: 0.1

title:super-pomurl:https://github.com/ian4hu/super-pom

Trust: 0.1

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2014-002308 // CNNVD: CNNVD-201404-581

EXTERNAL IDS

db:NVDid:CVE-2014-0114

Trust: 3.4

db:SECUNIAid:59118

Trust: 1.6

db:SECUNIAid:59480

Trust: 1.6

db:SECUNIAid:59246

Trust: 1.6

db:SECUNIAid:60177

Trust: 1.6

db:SECUNIAid:59479

Trust: 1.6

db:SECUNIAid:58710

Trust: 1.6

db:SECUNIAid:59718

Trust: 1.6

db:SECUNIAid:59430

Trust: 1.6

db:SECUNIAid:59464

Trust: 1.6

db:SECUNIAid:58851

Trust: 1.6

db:SECUNIAid:59228

Trust: 1.6

db:SECUNIAid:59704

Trust: 1.6

db:SECUNIAid:59014

Trust: 1.6

db:SECUNIAid:57477

Trust: 1.6

db:SECUNIAid:59245

Trust: 1.6

db:SECUNIAid:58947

Trust: 1.6

db:SECUNIAid:60703

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2014/07/08/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2014/06/15/10

Trust: 1.6

db:BIDid:67121

Trust: 1.6

db:ICS CERTid:ICSMA-20-184-01

Trust: 1.4

db:JVNDBid:JVNDB-2014-000056

Trust: 0.8

db:JVNDBid:JVNDB-2014-002308

Trust: 0.8

db:CS-HELPid:SB2022072128

Trust: 0.6

db:AUSCERTid:ESB-2020.1427

Trust: 0.6

db:AUSCERTid:ESB-2019.1089

Trust: 0.6

db:AUSCERTid:ESB-2019.3134

Trust: 0.6

db:AUSCERTid:ESB-2019.2355

Trust: 0.6

db:AUSCERTid:ESB-2019.0544

Trust: 0.6

db:AUSCERTid:ESB-2019.2568

Trust: 0.6

db:AUSCERTid:ESB-2020.2293.2

Trust: 0.6

db:JVNid:JVN30962312

Trust: 0.6

db:HITACHIid:HS14-018

Trust: 0.6

db:HITACHIid:HS14-020

Trust: 0.6

db:JUNIPERid:JSA10643

Trust: 0.6

db:CNNVDid:CNNVD-201404-581

Trust: 0.6

db:VULMONid:CVE-2014-0114

Trust: 0.1

db:PACKETSTORMid:126618

Trust: 0.1

db:PACKETSTORMid:127957

Trust: 0.1

db:PACKETSTORMid:126525

Trust: 0.1

db:PACKETSTORMid:127868

Trust: 0.1

db:PACKETSTORMid:154792

Trust: 0.1

db:PACKETSTORMid:128873

Trust: 0.1

db:PACKETSTORMid:126620

Trust: 0.1

db:PACKETSTORMid:128211

Trust: 0.1

db:PACKETSTORMid:126455

Trust: 0.1

sources: VULMON: CVE-2014-0114 // JVNDB: JVNDB-2014-002308 // PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 126525 // PACKETSTORM: 127868 // PACKETSTORM: 154792 // PACKETSTORM: 128873 // PACKETSTORM: 126620 // PACKETSTORM: 128211 // PACKETSTORM: 126455 // CNNVD: CNNVD-201404-581 // NVD: CVE-2014-0114

REFERENCES

url:http://www.securityfocus.com/bid/67121

Trust: 2.8

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 2.2

url:http://www.vmware.com/security/advisories/vmsa-2014-0008.html

Trust: 2.2

url:http://www.debian.org/security/2014/dsa-2940

Trust: 2.2

url:http://www.ibm.com/support/docview.wss?uid=swg21675496

Trust: 2.2

url:https://access.redhat.com/errata/rhsa-2019:2995

Trust: 1.7

url:https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3cannounce.apache.org%3e

Trust: 1.6

url:http://openwall.com/lists/oss-security/2014/06/15/10

Trust: 1.6

url:https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3ccommits.commons.apache.org%3e

Trust: 1.6

url:https://issues.apache.org/jira/browse/beanutils-463

Trust: 1.6

url:http://secunia.com/advisories/57477

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675898

Trust: 1.6

url:http://openwall.com/lists/oss-security/2014/07/08/1

Trust: 1.6

url:https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3cdev.commons.apache.org%3e

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20140911-0001/

Trust: 1.6

url:https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3ccommits.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/59430

Trust: 1.6

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.6

url:http://secunia.com/advisories/58851

Trust: 1.6

url:http://advisories.mageia.org/mgasa-2014-0219.html

Trust: 1.6

url:https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3cnotifications.commons.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/59704

Trust: 1.6

url:https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3cissues.activemq.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3cgitbox.activemq.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3cissues.activemq.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3cissues.activemq.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/59480

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676091

Trust: 1.6

url:https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3cuser.commons.apache.org%3e

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Trust: 1.6

url:http://secunia.com/advisories/59246

Trust: 1.6

url:http://secunia.com/advisories/59245

Trust: 1.6

url:http://secunia.com/advisories/59479

Trust: 1.6

url:http://secunia.com/advisories/59118

Trust: 1.6

url:https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://apache-ignite-developers.2346864.n4.nabble.com/cve-2014-0114-apache-ignite-is-vulnerable-to-existing-cve-2014-0114-td31205.html

Trust: 1.6

url:http://secunia.com/advisories/58947

Trust: 1.6

url:https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3cdev.commons.apache.org%3e

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.6

url:https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3ccommits.dolphinscheduler.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1091938

Trust: 1.6

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136958.html

Trust: 1.6

url:https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://security.gentoo.org/glsa/201607-09

Trust: 1.6

url:http://secunia.com/advisories/59014

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1116665

Trust: 1.6

url:http://secunia.com/advisories/58710

Trust: 1.6

url:https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3ccommits.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675266

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675387

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.6

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676110

Trust: 1.6

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.6

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e

Trust: 1.6

url:http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/release-notes.txt

Trust: 1.6

url:https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/59464

Trust: 1.6

url:https://access.redhat.com/errata/rhsa-2018:2669

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675972

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676303

Trust: 1.6

url:https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674128

Trust: 1.6

url:https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3cdev.commons.apache.org%3e

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677110

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05324755

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=140119284401582&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141451023707502&w=2

Trust: 1.6

url:http://secunia.com/advisories/59228

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.6

url:https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3cdevnull.infra.apache.org%3e

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676931

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675689

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21676375

Trust: 1.6

url:https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/60177

Trust: 1.6

url:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3csolr-user.lucene.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdvsa-2014:095

Trust: 1.6

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.6

url:https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3cdev.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3csolr-user.lucene.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/60703

Trust: 1.6

url:https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3cnotifications.commons.apache.org%3e

Trust: 1.6

url:http://secunia.com/advisories/59718

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674812

Trust: 1.6

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042296

Trust: 1.6

url:https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.6

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3ccommits.druid.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3ccommits.pulsar.apache.org%3e

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=140801096002766&w=2

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20180629-0006/

Trust: 1.6

url:https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3csolr-user.lucene.apache.org%3e

Trust: 1.6

url:https://access.redhat.com/solutions/869353

Trust: 1.6

url:https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.6

url:https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3cissues.commons.apache.org%3e

Trust: 1.6

url:https://us-cert.cisa.gov/ics/advisories/icsma-20-184-01

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0114

Trust: 0.9

url:http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000056.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0114

Trust: 0.8

url:https://rhn.redhat.com/errata/rhsa-2014-0497.html

Trust: 0.7

url:https://rhn.redhat.com/errata/rhsa-2014-0500.html

Trust: 0.7

url:http://struts.apache.org/release/2.3.x/docs/s2-021.html

Trust: 0.7

url:https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86@%3cdev.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f@%3cnotifications.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3csolr-user.lucene.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3@%3cnotifications.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3ccommits.pulsar.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd@%3ccommits.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3csolr-user.lucene.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5@%3ccommits.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30@%3cissues.activemq.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3cdev.drill.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3cdev.drill.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e@%3cissues.activemq.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40@%3cgitbox.activemq.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1@%3cdev.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477@%3ccommits.dolphinscheduler.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639@%3ccommits.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3cdevnull.infra.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3cissues.drill.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3cannounce.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25@%3cdev.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c@%3cissues.activemq.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f@%3cuser.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3csolr-user.lucene.apache.org%3e

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037622

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677352

Trust: 0.6

url:http://jvn.jp/en/jp/jvn30962312/index.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680194

Trust: 0.6

url:http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15282.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037424

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680698

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21679331

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674905

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674113

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673877

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673878

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676091

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674613

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21677298

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676485

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675496

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21677449

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674339

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674016

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674017

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674191

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674379www-01.ibm.com/support/docview.wss?uid=swg21677335

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674310

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21677802

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21675387

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21680716

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678359

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673422

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673982

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674110

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673992

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674104

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21674099

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673695

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673508

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21673757

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004807

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037506

Trust: 0.6

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037409

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037825

Trust: 0.6

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-020/index.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21678830

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg24037507

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61058

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61039

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042184

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042185

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg27042186

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676646

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21680848

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv61061

Trust: 0.6

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05324755

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04473828

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04399728

Trust: 0.6

url:https://rhn.redhat.com/errata/rhsa-2014-0498.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673101

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673944

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673098

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21676375

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21672316

Trust: 0.6

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-018/index.html

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21673663

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21675822

Trust: 0.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04311273

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674937

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674428

Trust: 0.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21674435

Trust: 0.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10643&cat=sirt_1&actp=list

Trust: 0.6

url:http://www.liferay.com/community/security-team/known-vulnerabilities/-/asset_publisher/t8ei/content/cst-sa-lps-46552-struts-1-classloader-manipulation

Trust: 0.6

url:https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3ccommits.druid.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859@%3cdev.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8@%3cissues.commons.apache.org%3e

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10795183

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://issues.apache.org/jira/browse/beanutils-520

Trust: 0.6

url:https://www.mail-archive.com/announce@apache.org/msg05413.html

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10887121

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10957873

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10887119

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10887113

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10888007

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10887999

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10887973

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10888009

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75922

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-3/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2568/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1427/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6494701

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-warehouse-has-released-a-fix-in-response-to-multiple-vulnerabilities-found-in-ibm-db2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2355/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-identified-in-ibm-storediq/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-db2-that-affect-the-ibm-performance-management-product/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-db2-and-ibm-java-runtime-affect-ibm-spectrum-protect-server/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-open-source-used-in-ibm-cloud-pak-system/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2293.2/

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10879093

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78218

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3134/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072128

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-workspace-is-affected-by-security-vulnerabilities-3/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2014-0114.html

Trust: 0.3

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://access.redhat.com/site/articles/11258

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse&downloadtype=securitypatches&version=6.1.0

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2014-0474.html

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00321

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00320

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00322

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00324

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00318

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00319

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00316

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00315

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00323

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/sis_00317

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-0114

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.broker&version=7.5.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_amq/7.5/

Trust: 0.1

url:https://twitter.com/vmwaresrc

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0242

Trust: 0.1

url:http://www.vmware.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0050

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0114

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4590

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4322

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1914

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0242

Trust: 0.1

url:https://www.vmware.com/patchmgr/findpatch.portal

Trust: 0.1

url:https://www.vmware.com/support/policies/lifecycle.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1914

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:https://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:https://www.vmware.com/go/download-vsphere

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0050

Trust: 0.1

url:http://twitter.com/rgielen

Trust: 0.1

url:http://struts.apache.org/struts1eol-announcement.html

Trust: 0.1

url:http://h30499.www3.hp.com/t5/hp-security-research-blog/protect-your-struts1-applications/ba-p/6463188#.u2j7xeasxro

Trust: 0.1

sources: JVNDB: JVNDB-2014-002308 // PACKETSTORM: 126618 // PACKETSTORM: 127957 // PACKETSTORM: 126525 // PACKETSTORM: 127868 // PACKETSTORM: 154792 // PACKETSTORM: 128873 // PACKETSTORM: 126620 // PACKETSTORM: 128211 // PACKETSTORM: 126455 // CNNVD: CNNVD-201404-581 // NVD: CVE-2014-0114

CREDITS

Rene Gielen

Trust: 0.7

sources: PACKETSTORM: 126455 // CNNVD: CNNVD-201404-581

SOURCES

db:VULMONid:CVE-2014-0114
db:JVNDBid:JVNDB-2014-002308
db:PACKETSTORMid:126618
db:PACKETSTORMid:127957
db:PACKETSTORMid:126525
db:PACKETSTORMid:127868
db:PACKETSTORMid:154792
db:PACKETSTORMid:128873
db:PACKETSTORMid:126620
db:PACKETSTORMid:128211
db:PACKETSTORMid:126455
db:CNNVDid:CNNVD-201404-581
db:NVDid:CVE-2014-0114

LAST UPDATE DATE

2024-12-25T19:50:24.473000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-0114date:2023-02-13T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2020-09-02T00:00:00
db:CNNVDid:CNNVD-201404-581date:2023-04-14T00:00:00
db:NVDid:CVE-2014-0114date:2024-11-21T02:01:23.960

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-0114date:2014-04-30T00:00:00
db:JVNDBid:JVNDB-2014-002308date:2014-05-01T00:00:00
db:PACKETSTORMid:126618date:2014-05-14T19:24:00
db:PACKETSTORMid:127957date:2014-08-21T19:34:50
db:PACKETSTORMid:126525date:2014-05-07T15:04:23
db:PACKETSTORMid:127868date:2014-08-14T22:49:43
db:PACKETSTORMid:154792date:2019-10-10T14:43:55
db:PACKETSTORMid:128873date:2014-10-28T18:09:30
db:PACKETSTORMid:126620date:2014-05-14T19:26:00
db:PACKETSTORMid:128211date:2014-09-11T21:08:01
db:PACKETSTORMid:126455date:2014-05-03T02:09:52
db:CNNVDid:CNNVD-201404-581date:2014-04-30T00:00:00
db:NVDid:CVE-2014-0114date:2014-04-30T10:49:03.973