CVE-2018-9104
https://notcve.org/view.php?id=CVE-2018-9104
A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the api.php page. A successful exploit could allow an attacker to execute arbitrary scripts. Una vulnerabilidad en el componente conferencing de Mitel MiVoice Connect, en versiones R1707-PREM SP1 (21.84.5535.0) y anteriores y Mitel ST 14.2, en versiones GA27 (19.49.5200.0) y anteriores, podría permitir que un atacante no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado debido a la validación insuficiente de la página api.php. Su explotación con éxito podría permitir que el atacante ejecute scripts arbitrarios. • https://www.mitel.com/mitel-product-security-advisory-18-0003 https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-9102
https://notcve.org/view.php?id=CVE-2018-9102
A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct an SQL injection attack due to insufficient input validation for the signin interface. A successful exploit could allow an attacker to extract sensitive information from the database. Una vulnerabilidad en el componente conferencing de Mitel MiVoice Connect, en versiones R1707-PREM SP1 (21.84.5535.0) y anteriores y Mitel ST 14.2, en versiones GA27 (19.49.5200.0) y anteriores, podría permitir que un atacante no autenticado lleve a cabo un ataque de inyección SQL debido a la validación insuficiente de entradas de la interfaz signin. Su explotación con éxito podría permitir que el atacante extraiga información sensible de la base de datos. • https://www.mitel.com/mitel-product-security-advisory-18-0003 https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-9101
https://notcve.org/view.php?id=CVE-2018-9101
A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the launch_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts. Una vulnerabilidad en el componente conferencing de Mitel MiVoice Connect, en versiones R1707-PREM SP1 (21.84.5535.0) y anteriores y Mitel ST 14.2, en versiones GA27 (19.49.5200.0) y anteriores, podría permitir que un atacante no autenticado lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado debido a la validación insuficiente de la página launch_presenter.php. Su explotación con éxito podría permitir que el atacante ejecute scripts arbitrarios. • https://www.mitel.com/mitel-product-security-advisory-18-0003 https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2014-0160 – OpenSSL Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Las implementaciones de (1) TLS y (2) DTLS en OpenSSL 1.0.1 en versiones anteriores a 1.0.1g no manejan adecuadamente paquetes Heartbeat Extension, lo que permite a atacantes remotos obtener información sensible desde la memoria de proceso a través de paquetes manipulados que desencadenan una sobrelectura del buffer, según lo demostrado mediante la lectura de claves privadas, relacionado con d1_both.c y t1_lib.c, también conocido como bug Heartbleed. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. • https://www.exploit-db.com/exploits/32764 https://www.exploit-db.com/exploits/32791 https://www.exploit-db.com/exploits/32998 https://www.exploit-db.com/exploits/32745 https://github.com/0x90/CVE-2014-0160 https://github.com/jdauphant/patch-openssl-CVE-2014-0160 https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC https://github.com/obayesshelton/CVE-2014-0160-Scanner https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin https://github.com/Xyl2k/CVE-2014 • CWE-125: Out-of-bounds Read CWE-201: Insertion of Sensitive Information Into Sent Data •