VARIoT IoT vulnerabilities database
| VAR-201601-0675 | No CVE | BalckEnergy SSH Backdoor |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The user's password is generated using a simpler algorithm , The attacker can obtain the highest authentication authority directly after analysis and cracking ( root ) Permissions
| VAR-201601-0678 | No CVE | Telnet Weak password |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Telnet Weak password vulnerability, allowing weak password login
| VAR-201601-0679 | No CVE | SSH Weak password |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
SSH Weak password vulnerability, allowing weak password login
| VAR-201601-0045 | CVE-2016-1303 | Cisco Small Business 500 Device Web GUI Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The web GUI on Cisco Small Business 500 devices 1.2.0.92 allows remote attackers to cause a denial of service via a crafted HTTP request, aka Bug ID CSCul65330. A security vulnerability exists in the WebGUI of CiscoSmallBusiness500Device, which can be denied by a remote attacker by sending a specially crafted HTTP request.
An attacker can exploit this issue to cause denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCul65330
| VAR-201601-0003 | CVE-2015-6319 | Cisco RV220W SQL Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574. The Cisco RV220W is a wireless VPN firewall router product from Cisco Systems, USA. Cisco RV220W devices are prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.
This issue is tracked by Cisco Bug ID CSCuv29574
| VAR-201601-0489 | CVE-2015-6421 | Cisco Wide Area Application Service and Virtual WAAS Run on device CIFS Service disruption in optimization function (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
cifs-ao in the CIFS optimization functionality on Cisco Wide Area Application Service (WAAS) and Virtual WAAS (vWAAS) devices 5.x before 5.3.5d and 5.4 and 5.5 before 5.5.3 allows remote attackers to cause a denial of service (resource consumption and device reload) via crafted network traffic, aka Bug ID CSCus85330. Cisco Wide Area Application Services is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to reload the affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCus85330. WAAS is a set of WAN link acceleration software. This software is mainly used in the link environment with small bandwidth and large delay. vWAAS is a cloud-based WAN optimization solution. The solution supports the use of policy-based on-demand business processes to accelerate private and virtual private cloud infrastructure and application delivery. There is a security vulnerability in cifs-ao in the CIFS optimization feature of Cisco WAAS and vWAAS. The following products and versions are affected: Cisco WAAS and vWAAS 5.3.5d prior to 5.x releases, 5.4 releases, 5.5.3 prior to 5.5 releases
| VAR-201601-0043 | CVE-2016-1299 | Cisco Small Business SG300 Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The web-management GUI implementation on Cisco Small Business SG300 devices 1.4.1.x allows remote attackers to cause a denial of service (HTTPS outage) via crafted HTTPS requests, aka Bug ID CSCuw87174. CiscoSmallBusinessSG300 is the SG300 series of intelligent switches from Cisco. Cisco Small Business SG300 Managed Switch is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCuw87174
| VAR-201601-0044 | CVE-2016-1300 | Cisco Unity Connection Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Unity Connection (UC) 10.5(2.3009) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCux82582.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by following Cisco Bug ID's
CSCux82576
CSCux82582
CSCux82587
CSCux82590
CSCux82602
CSCux82608. The platform can use voice commands to make calls or listen to messages "hands-free"
| VAR-201604-0554 | CVE-2015-7676 | Ipswitch MOVEit File Transfer Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and earlier, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files. Ipswitch MOVEit File Transfer is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
Ipswitch MOVEit File Transfer versions 8.1 and prior are vulnerable. The system supports control, management, and visibility into all business-critical file transfer activities through a single, secure system
| VAR-201601-0401 | CVE-2016-1136 | HOME SPOT CUBE vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on user's web browser. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions
| VAR-201601-0402 | CVE-2016-1137 | HOME SPOT CUBE vulnerable to open redirect |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
Open redirect vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A user may be transferred to the external website specified by an attacker. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions
| VAR-201601-0403 | CVE-2016-1138 | HOME SPOT CUBE vulnerable to HTTP header injection |
CVSS V2: 4.3 CVSS V3: 4.7 Severity: MEDIUM |
CRLF injection vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote attackers to inject arbitrary HTTP headers via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An HTTP response splitting attack may result in arbitrary cookie values. A CRLF injection vulnerability exists in previous versions of KDDIHOMESPOTCUBE2. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions.
Note- HOME SPOT CUBE2 is not affected by these vulnerabilities
| VAR-201601-0404 | CVE-2016-1139 | HOME SPOT CUBE vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: HIGH |
Cross-site request forgery (CSRF) vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary administrative operation such as setting alteration may be executed. A remote attacker could exploit this vulnerability to perform unauthorized operations. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions.
Note- HOME SPOT CUBE2 is not affected by these vulnerabilities
| VAR-201601-0405 | CVE-2016-1140 | HOME SPOT CUBE vulnerable to clickjacking |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
KDDI HOME SPOT CUBE devices before 2 allow remote attackers to conduct clickjacking attacks via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary administrative operation such as setting alteration may be executed. A security vulnerability exists in previous versions of KDDIHOMESPOTCUBE2. A remote attacker can exploit this vulnerability to execute arbitrary OS commands. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions
| VAR-201601-0406 | CVE-2016-1141 | HOME SPOT CUBE vulnerable to OS command injection |
CVSS V2: 6.5 CVSS V3: 4.7 Severity: MEDIUM |
KDDI HOME SPOT CUBE devices before 2 allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. HOME SPOT CUBE contains an OS command injection vulnerability. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed with the privileges of the application. A security vulnerability exists in previous versions of KDDIHOMESPOTCUBE2. KDDI Home Spot Cube is prone to the following security vulnerabilities:
Cross-site scripting - CVE-2016-1136
Open redirect - CVE-2016-1137
HTTP header injection - CVE-2016-1138
Cross-site request forgery - CVE-2016-1139
Click jacking - CVE-2016-1140
OS command injection - CVE-2016-1141
Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions.
Note- HOME SPOT CUBE2 is not affected by these vulnerabilities
| VAR-201601-0028 | CVE-2016-0869 | MICROSYS PROMOTIC Heap-based buffer overflow vulnerability |
CVSS V2: 7.1 CVSS V3: 5.0 Severity: MEDIUM |
Heap-based buffer overflow in MICROSYS PROMOTIC before 8.3.11 allows remote authenticated users to cause a denial of service via a malformed HTML document. MICROSYS PROMOTIC is a Windows-based monitoring and data acquisition human-machine interface software programming suite for industrial applications. MICROSYS PROMOTIC is prone to a local heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, code-execution may be possible; however this has not been confirmed
| VAR-201601-0027 | CVE-2016-0868 | Rockwell Automation MicroLogix 1100 PLC Stack Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request. Rockwell Automation Allen-Bradley MicroLogix 11001763-L16AWA is a programmable logic controller (PLC) product from Rockwell Corporation of the United States. Multiple MicroLogix 1100 PLC products are prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user supplied data. Failed exploit attempts will likely cause denial-of-service conditions. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA, etc. The following models and revisions are affected: Allen-Bradley MicroLogix 1100 1763-L16AWA (Series B), 1763-L16BBB (Series B), 1763-L16BWA (Series B), 1763-L16DWD (Series B), 1763-L16AWA (Series A ), 1763-L16BBB (Series A), 1763-L16BWA (Series A), 1763-L16DWD (Series A) 15.000 and earlier
| VAR-201601-0551 | CVE-2016-1941 | Mac OS X Run on Mozilla Firefox Vulnerable to a clickjacking attack in the file download dialog |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
The file-download dialog in Mozilla Firefox before 44.0 on OS X enables a certain button too quickly, which allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended. Mozilla Firefox is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks.
This issue is fixed in:
Firefox 44. Mozilla Firefox is an open source web browser developed by the Mozilla Foundation in the United States. A security vulnerability exists in the file-download dialog in Mozilla Firefox prior to 44.0 on OS X. The vulnerability is caused by the short interval between the dialog gaining focus and the button being available. Remote attackers can use specially crafted Web sites to exploit this vulnerability to carry out clickjacking attacks. From: Yury German <blueknight@gentoo.org>
To: gentoo-announce@lists.gentoo.org
Message-ID: <916540f6-4310-774b-bd6f-8f60d477da02@gentoo.org>
Subject: [ GLSA 201605-06 ] Mozilla Products: Multiple vulnerabilities
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201605-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Mozilla Products: Multiple vulnerabilities
Date: May 31, 2016
Bugs: #549356, #557590, #559186, #561246, #563230, #564834,
#573074, #574596, #576862
ID: 201605-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Firefox, Thunderbird,
Network Security Services (NSS), and NetScape Portable Runtime (NSPR)
with the worst of which may allow remote execution of arbitrary code.
Background
==========
Mozilla Firefox is an open-source web browser, Mozilla Thunderbird an
open-source email client, and the Network Security Service (NSS) is a
library implementing security features like SSL v.2/v.3, TLS, PKCS #5,
PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. The
SeaMonkey project is a community effort to deliver production-quality
releases of code derived from the application formerly known as
'Mozilla Application Suite'.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/nspr < 4.12 >= 4.12
2 dev-libs/nss < 3.22.2 >= 3.22.2
3 mail-client/thunderbird < 38.7.0 >= 38.7.0
4 mail-client/thunderbird-bin
< 38.7.0 >= 38.7.0
5 www-client/firefox < 38.7.0 >= 38.7.0
6 www-client/firefox-bin < 38.7.0 >= 38.7.0
-------------------------------------------------------------------
6 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Firefox, NSS, NSPR,
and Thunderbird. Please review the CVE identifiers referenced below for
details.
Impact
======
A remote attacker could entice a user to view a specially crafted web
page or email, possibly resulting in execution of arbitrary code or a
Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All NSS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/nss-3.22.2"
All Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.7.0"=
All users of the Thunderbird binary package should upgrade to the
latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.7.0"
All Firefox 38.7.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-38.7.0"
All users of the Firefox 38.7.x binary package should upgrade to the
latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.7.0"
References
==========
[ 1 ] CVE-2015-2708
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708
[ 2 ] CVE-2015-2708
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708
[ 3 ] CVE-2015-2709
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709
[ 4 ] CVE-2015-2709
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709
[ 5 ] CVE-2015-2710
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710
[ 6 ] CVE-2015-2710
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710
[ 7 ] CVE-2015-2711
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711
[ 8 ] CVE-2015-2711
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711
[ 9 ] CVE-2015-2712
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712
[ 10 ] CVE-2015-2712
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712
[ 11 ] CVE-2015-2713
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713
[ 12 ] CVE-2015-2713
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713
[ 13 ] CVE-2015-2714
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714
[ 14 ] CVE-2015-2714
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714
[ 15 ] CVE-2015-2715
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715
[ 16 ] CVE-2015-2715
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715
[ 17 ] CVE-2015-2716
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716
[ 18 ] CVE-2015-2716
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716
[ 19 ] CVE-2015-2717
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717
[ 20 ] CVE-2015-2717
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717
[ 21 ] CVE-2015-2718
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718
[ 22 ] CVE-2015-2718
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718
[ 23 ] CVE-2015-4473
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473
[ 24 ] CVE-2015-4473
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473
[ 25 ] CVE-2015-4474
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474
[ 26 ] CVE-2015-4474
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474
[ 27 ] CVE-2015-4475
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475
[ 28 ] CVE-2015-4475
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475
[ 29 ] CVE-2015-4477
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477
[ 30 ] CVE-2015-4477
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477
[ 31 ] CVE-2015-4478
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478
[ 32 ] CVE-2015-4478
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478
[ 33 ] CVE-2015-4479
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479
[ 34 ] CVE-2015-4479
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479
[ 35 ] CVE-2015-4480
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480
[ 36 ] CVE-2015-4480
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480
[ 37 ] CVE-2015-4481
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481
[ 38 ] CVE-2015-4481
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481
[ 39 ] CVE-2015-4482
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482
[ 40 ] CVE-2015-4482
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482
[ 41 ] CVE-2015-4483
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483
[ 42 ] CVE-2015-4483
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483
[ 43 ] CVE-2015-4484
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484
[ 44 ] CVE-2015-4484
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484
[ 45 ] CVE-2015-4485
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485
[ 46 ] CVE-2015-4485
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485
[ 47 ] CVE-2015-4486
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486
[ 48 ] CVE-2015-4486
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486
[ 49 ] CVE-2015-4487
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487
[ 50 ] CVE-2015-4487
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487
[ 51 ] CVE-2015-4488
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488
[ 52 ] CVE-2015-4488
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488
[ 53 ] CVE-2015-4489
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489
[ 54 ] CVE-2015-4489
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489
[ 55 ] CVE-2015-4490
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490
[ 56 ] CVE-2015-4490
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490
[ 57 ] CVE-2015-4491
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491
[ 58 ] CVE-2015-4491
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491
[ 59 ] CVE-2015-4492
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492
[ 60 ] CVE-2015-4492
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492
[ 61 ] CVE-2015-4493
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493
[ 62 ] CVE-2015-4493
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493
[ 63 ] CVE-2015-7181
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181
[ 64 ] CVE-2015-7182
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182
[ 65 ] CVE-2015-7183
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183
[ 66 ] CVE-2016-1523
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523
[ 67 ] CVE-2016-1523
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523
[ 68 ] CVE-2016-1930
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930
[ 69 ] CVE-2016-1930
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930
[ 70 ] CVE-2016-1931
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931
[ 71 ] CVE-2016-1931
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931
[ 72 ] CVE-2016-1933
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933
[ 73 ] CVE-2016-1933
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933
[ 74 ] CVE-2016-1935
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935
[ 75 ] CVE-2016-1935
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935
[ 76 ] CVE-2016-1937
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937
[ 77 ] CVE-2016-1937
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937
[ 78 ] CVE-2016-1938
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938
[ 79 ] CVE-2016-1938
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938
[ 80 ] CVE-2016-1939
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939
[ 81 ] CVE-2016-1939
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939
[ 82 ] CVE-2016-1940
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940
[ 83 ] CVE-2016-1940
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940
[ 84 ] CVE-2016-1941
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941
[ 85 ] CVE-2016-1941
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941
[ 86 ] CVE-2016-1942
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942
[ 87 ] CVE-2016-1942
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942
[ 88 ] CVE-2016-1943
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943
[ 89 ] CVE-2016-1943
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943
[ 90 ] CVE-2016-1944
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944
[ 91 ] CVE-2016-1944
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944
[ 92 ] CVE-2016-1945
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945
[ 93 ] CVE-2016-1945
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945
[ 94 ] CVE-2016-1946
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946
[ 95 ] CVE-2016-1946
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946
[ 96 ] CVE-2016-1947
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947
[ 97 ] CVE-2016-1947
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947
[ 98 ] CVE-2016-1948
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948
[ 99 ] CVE-2016-1948
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948
[ 100 ] CVE-2016-1949
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949
[ 101 ] CVE-2016-1949
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949
[ 102 ] CVE-2016-1950
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950
[ 103 ] CVE-2016-1950
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950
[ 104 ] CVE-2016-1952
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952
[ 105 ] CVE-2016-1952
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952
[ 106 ] CVE-2016-1953
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953
[ 107 ] CVE-2016-1953
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953
[ 108 ] CVE-2016-1954
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954
[ 109 ] CVE-2016-1954
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954
[ 110 ] CVE-2016-1955
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955
[ 111 ] CVE-2016-1955
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955
[ 112 ] CVE-2016-1956
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956
[ 113 ] CVE-2016-1956
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956
[ 114 ] CVE-2016-1957
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957
[ 115 ] CVE-2016-1957
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957
[ 116 ] CVE-2016-1958
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958
[ 117 ] CVE-2016-1958
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958
[ 118 ] CVE-2016-1959
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959
[ 119 ] CVE-2016-1959
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959
[ 120 ] CVE-2016-1960
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960
[ 121 ] CVE-2016-1960
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960
[ 122 ] CVE-2016-1961
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961
[ 123 ] CVE-2016-1961
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961
[ 124 ] CVE-2016-1962
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962
[ 125 ] CVE-2016-1962
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962
[ 126 ] CVE-2016-1963
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963
[ 127 ] CVE-2016-1963
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963
[ 128 ] CVE-2016-1964
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964
[ 129 ] CVE-2016-1964
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964
[ 130 ] CVE-2016-1965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965
[ 131 ] CVE-2016-1965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965
[ 132 ] CVE-2016-1966
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966
[ 133 ] CVE-2016-1966
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966
[ 134 ] CVE-2016-1967
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967
[ 135 ] CVE-2016-1967
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967
[ 136 ] CVE-2016-1968
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968
[ 137 ] CVE-2016-1968
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968
[ 138 ] CVE-2016-1969
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969
[ 139 ] CVE-2016-1969
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969
[ 140 ] CVE-2016-1970
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970
[ 141 ] CVE-2016-1970
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970
[ 142 ] CVE-2016-1971
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971
[ 143 ] CVE-2016-1971
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971
[ 144 ] CVE-2016-1972
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972
[ 145 ] CVE-2016-1972
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972
[ 146 ] CVE-2016-1973
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973
[ 147 ] CVE-2016-1973
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973
[ 148 ] CVE-2016-1974
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974
[ 149 ] CVE-2016-1974
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974
[ 150 ] CVE-2016-1975
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975
[ 151 ] CVE-2016-1975
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975
[ 152 ] CVE-2016-1976
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976
[ 153 ] CVE-2016-1976
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976
[ 154 ] CVE-2016-1977
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977
[ 155 ] CVE-2016-1977
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977
[ 156 ] CVE-2016-1978
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978
[ 157 ] CVE-2016-1978
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978
[ 158 ] CVE-2016-1979
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979
[ 159 ] CVE-2016-1979
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979
[ 160 ] CVE-2016-2790
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790
[ 161 ] CVE-2016-2790
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790
[ 162 ] CVE-2016-2791
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791
[ 163 ] CVE-2016-2791
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791
[ 164 ] CVE-2016-2792
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792
[ 165 ] CVE-2016-2792
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792
[ 166 ] CVE-2016-2793
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793
[ 167 ] CVE-2016-2793
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793
[ 168 ] CVE-2016-2794
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794
[ 169 ] CVE-2016-2794
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794
[ 170 ] CVE-2016-2795
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795
[ 171 ] CVE-2016-2795
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795
[ 172 ] CVE-2016-2796
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796
[ 173 ] CVE-2016-2796
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796
[ 174 ] CVE-2016-2797
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797
[ 175 ] CVE-2016-2797
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797
[ 176 ] CVE-2016-2798
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798
[ 177 ] CVE-2016-2798
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798
[ 178 ] CVE-2016-2799
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799
[ 179 ] CVE-2016-2799
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799
[ 180 ] CVE-2016-2800
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800
[ 181 ] CVE-2016-2800
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800
[ 182 ] CVE-2016-2801
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801
[ 183 ] CVE-2016-2801
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801
[ 184 ] CVE-2016-2802
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802
[ 185 ] CVE-2016-2802
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201605-06
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--Bs4bwglUWSbluQjJQQ051Q7fVoU1XxLw6
| VAR-201601-0042 | CVE-2016-1298 | Cisco Unified Contact Center Express Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unified Contact Center Express 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via vectors related to permalinks, aka Bug ID CSCux92033.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCux92033. This component integrates agent application and self-service voice service, and provides functions such as call distribution and customer access control. The following releases are affected: Cisco Unified CCX Release 10.0(1), Release 10.5(1), Release 10.6(1), Release 11.0(1)
| VAR-201601-0529 | CVE-2016-1896 | Lexmark Vulnerability that bypasses authentication in printer firmware initialization process |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Race condition in the initialization process on Lexmark printers with firmware ATL before ATL.02.049, CB before CB.02.049, PP before PP.02.049, and YK before YK.02.049 allows remote attackers to bypass authentication by leveraging incorrect detection of the security-jumper status. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlAuthentication may be circumvented by a third party using unauthorized detection of the security jumper status. Lexmarkprinter is a printer product from Lexmark. A remote attacker bypasses authentication by incorrect detection of the security-jumper state. Lexmark Laser Printers are prone to a local authentication-bypass vulnerability.
A local attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. The following versions are affected: Lexmark printers using ATL versions prior to ATL.02.049, CB versions prior to CB.02.049, PP versions prior to PP.02.049, and YK versions prior to YK.02.049