VARIoT IoT vulnerabilities database
| VAR-201405-0497 | CVE-2014-2166 | Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0498 | CVE-2014-2167 | Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0499 | CVE-2014-2168 | Cisco TelePresence TC Software and TE Software buffer overflow vulnerability |
CVSS V2: 7.6 CVSS V3: - Severity: HIGH |
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804. Vendors have confirmed this vulnerability Bug ID CSCty44804 It is released as.Skillfully crafted by a third party DNS An arbitrary code may be executed via the response packet. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0488 | CVE-2014-2169 | Cisco TelePresence TC Software and TE Software arbitrary command execution vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211. Vendors have confirmed this vulnerability Bug ID CSCue60211 It is released as.An arbitrary command may be executed by a remotely authenticated user by using the command as an argument of an internal system script. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0489 | CVE-2014-2170 | Cisco TelePresence TC Software and TE Software arbitrary command execution vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202. Vendors have confirmed this vulnerability Bug ID CSCue60202 It is released as.By a remotely authenticated user tshell ( alias tcsh) An arbitrary command may be executed by using a command as an argument of the script. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0490 | CVE-2014-2171 | Cisco TelePresence TC Software and TE Software heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796. Vendors have confirmed this vulnerability Bug ID CSCud81796 It is released as.Skillfully crafted by a third party SIP An arbitrary code may be executed via a packet. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0491 | CVE-2014-2172 | Cisco TelePresence TC Software and TE Software buffer overflow vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693. Cisco TelePresence TC Software and TE The software contains a buffer overflow vulnerability. Vendors have confirmed this vulnerability Bug ID CSCub67693 It is released as.For local executables by local users u-boot Authority may be obtained by using improper handling of compiler flags. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The vulnerability is caused by the program not properly handling the u-boot compiler flag inside the executable
| VAR-201405-0492 | CVE-2014-2173 | Cisco TelePresence TC Software and TE Vulnerability gained privilege in software |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692. Vendors have confirmed this vulnerability Bug ID CSCub67692 It is released as.A local user could gain privileges via an unspecified command. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0465 | CVE-2014-2175 | Cisco TelePresence TC Software and TE Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849. Vendors have confirmed this vulnerability Bug ID CSCtq78849 It is released as.Skillfully crafted by a third party H.225 Service disruption via packets ( Memory consumption ) There is a possibility of being put into a state. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0537 | CVE-2014-3792 |
Beetel 450TC2 Router Cross-Site Request Forgery Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201404-0185 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in Beetel 450TC2 Router with firmware TX6-0Q-005_retail allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the uiViewTools_Password and uiViewTools_PasswordConfirm parameters to Forms/tools_admin_1. The Beetel 450TC2 Router is a router device. Beetel 450TC2 Router is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
Beetel 450TC2 Router running firmware versions TX6-0Q-005_retail is vulnerable; other versions may also be affected. The vulnerability is caused by the Forms/tools_admin_1 script not adequately filtering the 'uiViewTools_Password' and 'uiViewTools_PasswordConfirm' parameters
| VAR-201405-0321 | CVE-2014-1899 | Citrix NetScaler Gateway Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Citrix NetScaler Gateway (formerly Citrix Access Gateway Enterprise Edition) 9.x before 9.3.66.5 and 10.x before 10.1.123.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Citrix NetScaler Gateway 10.x prior 10.1.123.9 and 9.x prior 9.3.66.5 are vulnerable. This solution provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location
| VAR-201405-0482 | CVE-2014-2156 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0483 | CVE-2014-2157 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0484 | CVE-2014-2158 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0485 | CVE-2014-2159 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0486 | CVE-2014-2160 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0487 | CVE-2014-2161 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0493 | CVE-2014-2162 | Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201404-0699 | No CVE | NETGEAR DGN2200 ADSL Router Web Interface HTML Injection vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
NETGEAR DGN2200 is a wireless router product from NETGEAR.
An HTML injection vulnerability exists in Netgear DGN2200, which originates from the fact that the user does not properly filter the input submitted by the program before generating dynamic content. An attacker could use this vulnerability to execute arbitrary code on a browser in the context of an affected site. Helps steal cookie-based authentication and launch further attacks. There are vulnerabilities in Netgear DGN2200 1.0.0.29_1.7.29. Other versions may also be affected
| VAR-201405-0303 | CVE-2014-2882 | Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management GUI Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unspecified impact and vectors, related to certificate validation.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Lack of SSL Certificate Validation in Citrix Netscaler
CVE: CVE-2014-2882
Vendor: Citrix
Product: Netscaler
Affected version: All prior to 10.1-122.17/9.3-66.5
Fixed version: 10.1-122.17/9.3-66.5
Reported by: Graham Sutherland
Details:
The remote configuration Java applet assigns an empty trust manager to
its SSL context, causing it to accept any certificate regardless of
validity.
Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/
Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information