Page 2 of 11 results (0.007 seconds)

CVSS: 10.0EPSS: 9%CPEs: 2EXPL: 2

The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues. El router Thomson/Alcatel SpeedTouch 7G, como es usado por el BT Home Hub versión 6.2.6.B y anteriores, permite a atacantes remotos sobre una intranet omitir la autenticación y conseguir acceso administrativo por medio de vectores que incluyen un carácter '/' (barra diagonal) al final del PATH_INFO en cgi/b, también se conoce como "double-slash auth bypass". NOTA: atacantes remotos fuera de la intranet pueden explotar esto aprovechando una vulnerabilidad de tipo CSRF separada. • http://securityreason.com/securityalert/3213 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/481835/100/0/threaded http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.securityfocus.com/bid/25972 http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln https:&#x • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en el routerThomson/Alcatel SpeedTouch 7G, como es usado por el BT Home Hub versión 6.2.6.B y anteriores, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados. • http://securityreason.com/securityalert/3213 http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub http://www.securityfocus.com/archive/1/481835/100/0/threaded http://www.securityfocus.com/bid/25972 http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 7%CPEs: 1EXPL: 0

Multiple buffer overflows in the British Telecommunications Business Connect webhelper ActiveX control before 1.0.0.7 in btbconnectwebcontrol.dll allow remote attackers to execute arbitrary code via unspecified vectors. Múltiples desbordamientos de búfer en el control de ActiveX British Telecommunications Business Connect webhelper anterior al 1.0.0.7 en el btbconnectwebcontrol.dll permiten a atacantes remotos ejecutar código de su elección mediante vectores sin especificar. • http://osvdb.org/36718 http://secunia.com/advisories/25472 http://www.kb.cert.org/vuls/id/210257 http://www.securityfocus.com/bid/24216 http://www.vupen.com/english/advisories/2007/1979 https://exchange.xforce.ibmcloud.com/vulnerabilities/34589 •

CVSS: 7.5EPSS: 14%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in utilitaires/gestion_sondage.php in BT-Sondage 112 allows remote attackers to execute arbitrary PHP code via a URL in the repertoire_visiteur parameter. Vulnerabilidad de inclusión remota de archivo en PHP en utilitaires/gestion_sondage.php de BT-Sondage 112 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro repertoire_visiteur. • https://www.exploit-db.com/exploits/3624 http://osvdb.org/34597 http://secunia.com/advisories/24701 http://www.attrition.org/pipermail/vim/2007-April/001483.html http://www.securityfocus.com/bid/23248 http://www.vupen.com/english/advisories/2007/1183 https://exchange.xforce.ibmcloud.com/vulnerabilities/33363 •

CVSS: 5.0EPSS: 5%CPEs: 2EXPL: 2

BT Voyager 2091 Wireless firmware 2.21.05.08m_A2pB018c1.d16d and earlier, and 3.01m and earlier, allow remote attackers to bypass the authentication process and gain sensitive information, such as configuration information via (1) /btvoyager_getconfig.sh, PPP credentials via (2) btvoyager_getpppcreds.sh, and decode configuration credentials via (3) btvoyager_decoder.c. El firmware BT Voyager 2091 Wireless 2.21.05.08m_A2pB018c1.d16d y anteriores, y 3.01m y anteriores, permite a atacantes remotos evitar el proceso de autenticación y obtener información sensible, por ejemplo información de configuración, mediante (1) /btvoyager_getconfig.sh, credenciales PPP mediante (2) btvoyager_getpppcreds.sh, y decodificar credenciales de configuración mediante btvoyager_decoder.c. • https://www.exploit-db.com/exploits/2034 http://ikwt.dyndns.org/projects/btvoyager-getconfig.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047733.html http://secunia.com/advisories/20982 http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-3 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/440405/100/0/threaded http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.s • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-264: Permissions, Privileges, and Access Controls •