Tagged: cert

VU#241508: CacheGuard OS contains a cross-site request forgery vulnerability 0

VU#241508: CacheGuard OS contains a cross-site request forgery vulnerability

Vulnerability Note VU#241508 CacheGuard OS contains a cross-site request forgery vulnerability Original Release date: 10 Sep 2014 | Last revised: 10 Sep 2014 Overview CacheGuard OS v5.7.7 does not sufficiently verify whether a valid request was intentionally provided by the user, which results in a cross-site request forgery (CSRF) vulnerability. Description CWE-352 : Cross-Site Request Forgery (CSRF) CacheGuard OS v5.7.7 does not sufficiently verify whether a valid request was intentionally provided by the user. The cross-site request forgery (CSRF) vulnerability lies in  /gui/password-wadmin.apl Impact A remote unauthenticated attacker may be able to trick an authenticated user into clicking a specially crafted link, resulting in settings modification or privilege escalation.

VU#460687: Cobham Sailor satellite terminals contain hardcoded credentials 0

VU#460687: Cobham Sailor satellite terminals contain hardcoded credentials

Vulnerability Note VU#460687 Cobham Sailor satellite terminals contain hardcoded credentials Original Release date: 07 Aug 2014 | Last revised: 07 Aug 2014 Overview Cobham Sailor 900 and 6000 series satellite terminals contain hardcoded credentials. Description CWE-798 : Use of Hard-coded Credentials IOActive reports that Cobham Sailor 900 and 6000 series satellite communication terminals running firmware version: 1.08 MFHF / 2.11 VHF contain hardcoded administrator credentials.

VU#867980: Silver Peak VX is vulnerable to cross-site request forgery and cross-site scripting 0

VU#867980: Silver Peak VX is vulnerable to cross-site request forgery and cross-site scripting

Vulnerability Note VU#867980 Silver Peak VX is vulnerable to cross-site request forgery and cross-site scripting Original Release date: 28 Jul 2014 | Last revised: 28 Jul 2014 Overview Silver Peak VX version 6.2.2.0_47968 is vulnerable to cross-site request forgery and cross-site scripting. Description CWE-352 : Cross-Site Request Forgery (CSRF) – CVE-2014-2974 Silver Peak VX version 6.2.2.0_47968 contains a cross-site request forgery vulnerability in  /php/user_account.php that allows an unauthenticated user to create a new administrator account. CWE-79 : Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) – CVE-2014-2975 Silver Peak VX version 6.2.2.0_47968 also contains a reflected cross-site scripting vulnerability in /php/user_account.php that can allow an attacker to inject arbitrary HTML content (including scripts) via the vulnerable query string parameter user_id

VU#162308: Resin Pro improperly performs Unicode transformations 0

VU#162308: Resin Pro improperly performs Unicode transformations

Vulnerability Note VU#162308 Resin Pro improperly performs Unicode transformations Original Release date: 23 Jul 2014 | Last revised: 23 Jul 2014 Overview Resin Pro 4.0.39 and possibly earlier versions improperly performs Unicode transformations. Description CWE-20 : Improper Input Validation Resin Pro 4.0.39 and possibly earlier versions perform incorrect Unicode transformations on output to HTTP responses for ISO-8859-1

VU#917348: Datum Systems satellite modem devices contain multiple vulnerabilities 0

VU#917348: Datum Systems satellite modem devices contain multiple vulnerabilities

Vulnerability Note VU#917348 Datum Systems satellite modem devices contain multiple vulnerabilities Original Release date: 11 Jul 2014 | Last revised: 11 Jul 2014 Overview Datum Systems PSM-4500 and PSM-500 series satellite modem devices contain multiple vulnerabilities Description CWE-220 : Se nsitive Data Under FTP Root – CVE-2014-2950 The Datum Systems SnIP operating system on PSM-4500 and PSM-500 satellite modem devices has FTP enabled by default with no credentials required, which allows open access to sensitive areas of the file system. CWE-798 : Use of Hard-coded Credentials – CVE-2014-2951 The Datum Systems SnIP operating system on PSM-4500 and PSM-500 satellite modem devices has an undocumented admin user account with the password of admin. Impact A remote unauthenticated attacker may be able to gain full control of the device

VU#712660: Raritian PX power distribution software is vulnerable to the cipher zero attack. 0

VU#712660: Raritian PX power distribution software is vulnerable to the cipher zero attack.

Vulnerability Note VU#712660 Raritian PX power distribution software is vulnerable to the cipher zero attack. Original Release date: 10 Jul 2014 | Last revised: 10 Jul 2014 Overview Raritan PX power distribution software version 01.05.08 and previous running on a model DPXR20A-16 device allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. Description CWE-287 : Improper Authentication – CVE-2014-2955 Raritan PX power distribution software version 01.05.08 and previous running on a model DPXR20A-16 device allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password

VU#100972: Liferay Portal PCE contains multiple cross-site scripting vulnerabilities 0

VU#100972: Liferay Portal PCE contains multiple cross-site scripting vulnerabilities

Vulnerability Note VU#100972 Liferay Portal PCE contains multiple cross-site scripting vulnerabilities Original Release date: 09 Jul 2014 | Last revised: 09 Jul 2014 Overview Liferay Portal versions 6.1.2 CE GA3, 6.1.X EE, 6.2.X EE, Master contain multiple cross-site scripting vulnerabilities Description CWE-79 : Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) – CVE-2014-2963 Liferay is affected by a Persistent Cross Site Scripting vulnerability in the “my account area”. The specific versions affected are: Liferay Portal Community Edition 6.1.2 CE GA3, 6.1.X EE, 6.2.X EE, Master Three instances of this issue were identified, at the following locations/parameters: /group/control_panel/manage [_2_firstName parameter] /group/control_panel/manage [_2_lastName parameter] /group/control_panel/manage [_2_middleName parameter] Impact An attacker with access to the Liferay Portal “my account area” or by tricking a logged in user to visit a specially crafted URL, can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service. Solution Apply an Update This vulnerability was addressed on 06/04/14, bug id LPS-46156 .