VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201405-0497 CVE-2014-2166 Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0498 CVE-2014-2167 Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0499 CVE-2014-2168 Cisco TelePresence TC Software and TE Software buffer overflow vulnerability CVSS V2: 7.6
CVSS V3: -
Severity: HIGH
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804. Vendors have confirmed this vulnerability Bug ID CSCty44804 It is released as.Skillfully crafted by a third party DNS An arbitrary code may be executed via the response packet. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0488 CVE-2014-2169 Cisco TelePresence TC Software and TE Software arbitrary command execution vulnerability CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211. Vendors have confirmed this vulnerability Bug ID CSCue60211 It is released as.An arbitrary command may be executed by a remotely authenticated user by using the command as an argument of an internal system script. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0489 CVE-2014-2170 Cisco TelePresence TC Software and TE Software arbitrary command execution vulnerability CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202. Vendors have confirmed this vulnerability Bug ID CSCue60202 It is released as.By a remotely authenticated user tshell ( alias tcsh) An arbitrary command may be executed by using a command as an argument of the script. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0490 CVE-2014-2171 Cisco TelePresence TC Software and TE Software heap-based buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796. Vendors have confirmed this vulnerability Bug ID CSCud81796 It is released as.Skillfully crafted by a third party SIP An arbitrary code may be executed via a packet. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0491 CVE-2014-2172 Cisco TelePresence TC Software and TE Software buffer overflow vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693. Cisco TelePresence TC Software and TE The software contains a buffer overflow vulnerability. Vendors have confirmed this vulnerability Bug ID CSCub67693 It is released as.For local executables by local users u-boot Authority may be obtained by using improper handling of compiler flags. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The vulnerability is caused by the program not properly handling the u-boot compiler flag inside the executable
VAR-201405-0492 CVE-2014-2173 Cisco TelePresence TC Software and TE Vulnerability gained privilege in software CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692. Vendors have confirmed this vulnerability Bug ID CSCub67692 It is released as.A local user could gain privileges via an unspecified command. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0465 CVE-2014-2175 Cisco TelePresence TC Software and TE Service disruption in software (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849. Vendors have confirmed this vulnerability Bug ID CSCtq78849 It is released as.Skillfully crafted by a third party H.225 Service disruption via packets ( Memory consumption ) There is a possibility of being put into a state. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0537 CVE-2014-3792 Beetel 450TC2 Router Cross-Site Request Forgery Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201404-0185
CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in Beetel 450TC2 Router with firmware TX6-0Q-005_retail allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the uiViewTools_Password and uiViewTools_PasswordConfirm parameters to Forms/tools_admin_1. The Beetel 450TC2 Router is a router device. Beetel 450TC2 Router is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. Beetel 450TC2 Router running firmware versions TX6-0Q-005_retail is vulnerable; other versions may also be affected. The vulnerability is caused by the Forms/tools_admin_1 script not adequately filtering the 'uiViewTools_Password' and 'uiViewTools_PasswordConfirm' parameters
VAR-201405-0321 CVE-2014-1899 Citrix NetScaler Gateway Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Citrix NetScaler Gateway (formerly Citrix Access Gateway Enterprise Edition) 9.x before 9.3.66.5 and 10.x before 10.1.123.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Citrix NetScaler Gateway 10.x prior 10.1.123.9 and 9.x prior 9.3.66.5 are vulnerable. This solution provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location
VAR-201405-0482 CVE-2014-2156 Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0483 CVE-2014-2157 Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0484 CVE-2014-2158 Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0485 CVE-2014-2159 Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0486 CVE-2014-2160 Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0487 CVE-2014-2161 Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201405-0493 CVE-2014-2162 Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566. Multiple remote denial-of-service vulnerabilities 2. A buffer-overflow vulnerability 3. A command-injection vulnerability 4. A command-injection vulnerability 5. A heap-based buffer-overflow vulnerability 6. A local buffer-overflow vulnerability 7. A local authentication-bypass vulnerability 8. A remote denial-of-service vulnerability Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible. These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
VAR-201404-0699 No CVE NETGEAR DGN2200 ADSL Router Web Interface HTML Injection vulnerability CVSS V2: -
CVSS V3: -
Severity: -
NETGEAR DGN2200 is a wireless router product from NETGEAR. An HTML injection vulnerability exists in Netgear DGN2200, which originates from the fact that the user does not properly filter the input submitted by the program before generating dynamic content. An attacker could use this vulnerability to execute arbitrary code on a browser in the context of an affected site. Helps steal cookie-based authentication and launch further attacks. There are vulnerabilities in Netgear DGN2200 1.0.0.29_1.7.29. Other versions may also be affected
VAR-201405-0303 CVE-2014-2882 Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management GUI Vulnerability in CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unspecified impact and vectors, related to certificate validation. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Lack of SSL Certificate Validation in Citrix Netscaler CVE: CVE-2014-2882 Vendor: Citrix Product: Netscaler Affected version: All prior to 10.1-122.17/9.3-66.5 Fixed version: 10.1-122.17/9.3-66.5 Reported by: Graham Sutherland Details: The remote configuration Java applet assigns an empty trust manager to its SSL context, causing it to accept any certificate regardless of validity. Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/ Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited. Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information