traverse the directory path. Exploiting this vulnerability may enable an
attacker to access a limited number of hardcoded file types. Further
exploitation of this vulnerability may allow an attacker to cause the
web server component to enter a denial-of-service condition.
Metrics
Affected Vendors & Products
Solution
Cogent Real-Time Systems, Inc. has produced a new version of the Cogent DataHub application, Version 7.3.5, that fixes three of the four identified vulnerabilities. The updated version is available at the following address: http://cogentdatahub.com/Download_Software.html Cogent has indicated that it will not be fixing the cryptographic weaknesses of hashed usernames and passwords because of compatibility issues with existing systems. Cogent and the researcher agree that an effective mitigation strategy for users is to select sufficiently strong passwords. Cogent has indicated that password hashes can be checked for strength using sites such as: https://crackstation.net/ .
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname. | The directory specifier can include designators that can be used to traverse the directory path. Exploiting this vulnerability may enable an attacker to access a limited number of hardcoded file types. Further exploitation of this vulnerability may allow an attacker to cause the web server component to enter a denial-of-service condition. |
Title | Cogent DataHub Path Traversal | |
References |
| |
Metrics |
cvssV2_0
|
cvssV2_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-03T16:31:41.797Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2352

No data.

Status : Deferred
Published: 2014-05-30T23:55:02.847
Modified: 2025-10-03T17:15:45.107
Link: CVE-2014-2352

No data.

No data.