Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:dell:powervault_ml6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DFB91B9-A601-4F22-A1D2-D9DD5C8F9385", "versionEndIncluding": "i8.2.0.1_\\(641g.gs003\\)", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*", "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734", "vulnerable": true}, {"criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*", "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E26485A-B28F-42DF-8650-59A7D7C9D554", "versionEndIncluding": "i8.2.2.1_\\(646g.gs002\\)", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*", "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484", "vulnerable": true}, {"criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*", "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C", "vulnerable": true}, {"criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*", "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."}, {"lang": "es", "value": "logViewer.htm en el sistema de copias de seguridad de cintas Dell ML6000 con firmware anterior a i8.2.0.2 (641G.GS103) y el sistema de copias de seguridad de cintas Quantum Scalar i500 con firmware anterior a i8.2.2.1 (646G.GS002) permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres de shell en un par\u00e1metro de nombre de ruta."}], "id": "CVE-2014-2959", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-06-02T19:55:03.500", "references": [{"source": "cret@cert.org", "url": "http://secunia.com/advisories/59019"}, {"source": "cret@cert.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/124908"}, {"source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/67751"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59019"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/124908"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/67751"}], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}