Show plain JSON{"id": "CVE-2014-1649", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.9, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 5.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-05-16T11:12:00.773", "references": [{"url": "http://www.exploit-db.com/exploits/33521", "source": "secure@symantec.com"}, {"url": "http://www.securityfocus.com/bid/67189", "source": "secure@symantec.com"}, {"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140512_00", "tags": ["Vendor Advisory"], "source": "secure@symantec.com"}, {"url": "http://zerodayinitiative.com/advisories/ZDI-14-127/", "source": "secure@symantec.com"}, {"url": "http://www.exploit-db.com/exploits/33521", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/67189", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140512_00", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://zerodayinitiative.com/advisories/ZDI-14-127/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The server in Symantec Workspace Streaming (SWS) before 7.5.0.749 allows remote attackers to access files and functionality by sending a crafted XMLRPC request over HTTPS."}, {"lang": "es", "value": "El servidor en Symantec Workspace Streaming (SWS) anterior a 7.5.0.749 permite a atacantes remotos acceder a archivos y funcionalidad mediante el env\u00edo de una solicitud XMLRPC manipulada sobre HTTPS."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:symantec:workspace_streaming:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18AD51AE-DDE9-4FD3-8C05-39C6EBB4929F", "versionEndIncluding": "7.5.0"}, {"criteria": "cpe:2.3:a:symantec:workspace_streaming:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96313018-84AD-4DB4-B5FE-23A49840C0C7"}, {"criteria": "cpe:2.3:a:symantec:workspace_streaming:6.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "376E49E5-5631-4CFE-AF04-ABE615F3F2FA"}, {"criteria": "cpe:2.3:a:symantec:workspace_streaming:6.1:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25254E74-3A33-4FAA-914C-1BEE7388F478"}, {"criteria": "cpe:2.3:a:symantec:workspace_streaming:6.1:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C14E8F23-7CCA-4371-922A-7994E1D37879"}, {"criteria": "cpe:2.3:a:symantec:workspace_streaming:6.1:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F9C330E-FE35-40BB-ABB9-3A227999C2BD"}], "operator": "OR"}]}], "sourceIdentifier": "secure@symantec.com"}