3 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting (XSS) vulnerability in the administration page in Airvana HubBub C1-600-RT and Sprint AIRAVE 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en la página de administración en Airvana HubBub C1-600-RT y Sprint AIRAVE 2.5 permite a atacantes remotos inyectar script Web o HTML arbitrarios a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2013-02/0155.html http://osvdb.org/90732 http://packetstormsecurity.com/files/120594/Airvana-HubBub-C1-600-RT-Cross-Site-Scripting.html http://www.securityfocus.com/bid/58194 https://exchange.xforce.ibmcloud.com/vulnerabilities/82494 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages. El método de implementación onTouchEvent en Samsumg y HTC para Android en el dispositivo T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, y Samsung Galaxy S almacena las coordenadas de contacto en un búfer (dmesg) lo que permite a atacantes remotos obtener información sensible a través de una aplicación manipulada, una demostración para números de PIN, números de teléfono y mensajes de texto. • http://www.htc.com/www/help/app-security-fix http://www.kb.cert.org/vuls/id/251635 http://www.kb.cert.org/vuls/id/MAPG-8R5LD6 • CWE-255: Credentials Management Errors •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Sprint Nextel Sprint voice mail systems allow remote attackers to retrieve or remove messages, or reconfigure mailboxes, by spoofing Calling Number Identification (CNID, aka Caller ID). Los sistemas de correo de voz Sprint Nextel Sprint permite a atacantes remotos obtener o borrar mensajes, o reconfigurar buzones de correo, suplantando la Identificación de Número Entrante (CNID, Calling Number Identification o Caller ID) • http://osvdb.org/34984 http://www.kb.cert.org/vuls/id/726548 •