Page 2 of 9 results (0.007 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

A privilege escalation exists in UniFi Video Controller =<3.10.6 that would allow an attacker on the local machine to run arbitrary commands. Se presenta una escalada de privilegios en UniFi Video Controller versiones anteriores a 3.10.6 incluyéndola, que permitiría a un atacante en la máquina local ejecutar comandos arbitrarios. • https://hackerone.com/reports/544928 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

In UniFi Video 3.10.0 and prior, due to the lack of CSRF protection, it is possible to abuse the Web API to make changes on the server configuration without the user consent, requiring the attacker to lure an authenticated user to access on attacker controlled page. En UniFi Video versión 3.10.0 y las anteriores, debido a la falta de protección CSRF, es posible abusar de la API Web para realizar cambios en la configuración del servidor sin el consentimiento del usuario, requiere que el atacante atraiga a un usuario autenticado para que este acceda a una página controlada por el atacante. • https://community.ubnt.com/t5/UniFi-Video-Blog/UniFi-Video-3-10-1-Soft-Release/ba-p/2658279 https://hackerone.com/reports/329749 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file. Ubiquiti UniFi Video, en versiones anteriores a la 3.8.0 para Windows, emplea permisos débiles para el directorio de instalación, lo que permite que usuarios locales obtengan privilegios SYSTEM mediante un archivo troyano taskkill.exe. Ubiquiti UniFi Video version 3.7.3 (Windows) suffers from a local privilege escalation vulnerability due to insecure directory permissions. • https://www.exploit-db.com/exploits/43390 http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html http://seclists.org/fulldisclosure/2017/Dec/83 http://www.securityfocus.com/bid/102278 https://hackerone.com/reports/140793 • CWE-276: Incorrect Default Permissions •

CVSS: 6.0EPSS: 4%CPEs: 1EXPL: 4

The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file. La política de cruce de dominio Flash por defecto (crossdomain.xml) en Ubiquiti Networks UniFi Video (anteriormente AirVision también conocido como AirVision Controller) anterior a 3.0.1 no restringe el acceso a la aplicación, lo que permite a atacantes remotos evadir Same Origin Policy a través de un fichero SWF manipulado. Ubiquiti AirVision Controller version 2.1.3 suffers from an overly permissive default crossdomain.xml file. • https://www.exploit-db.com/exploits/39268 http://seclists.org/fulldisclosure/2014/Jul/128 http://sethsec.blogspot.com/2014/07/cve-2014-2227.html http://www.securityfocus.com/bid/68866 • CWE-264: Permissions, Privileges, and Access Controls •