Page 8 of 37 results (0.005 seconds)

CVSS: 9.0EPSS: 0%CPEs: 25EXPL: 0

Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3h) and 1.1 before 1.1(1j) and Nexus 9000 ACI Mode switches with software before 11.0(3h) and 11.1 before 11.1(1j) allow remote authenticated users to bypass intended RBAC restrictions via crafted REST requests, aka Bug ID CSCut12998. Dispositivos Cisco Application Policy Infrastructure Controller (APIC) con software anterior a 1.0(3h) y 1.1 en versiones anteriores a 1.1(1j) y switches Nexus 9000 ACI Mode con software anterior a 11.0(3h) y 11.1 en versiones anteriores a 11.1(1j) permite a usuarios remotos autenticados eludir las restricciones destinadas RBAC a través de peticiones REST manipuladas, también conocido como Bug ID CSCut12998. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-apic http://www.securitytracker.com/id/1034925 • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 1%CPEs: 30EXPL: 2

The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack. La característica Soft Access Point (AP) en Samsung Smart TV X10P, X12, X14H, X14J y NT14U e impresoras Xpress M288OFW genera claves WPA2 PSK débiles, lo que hace más fácil para atacantes remotos obtener información sensible o eludir la autenticación a través de un ataque de fuerza bruta. • http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html http://seclists.org/fulldisclosure/2015/Dec/79 http://www.securityfocus.com/bid/79675 http://www.securitytracker.com/id/1034503 http://www.securitytracker.com/id/1034504 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •