2 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 220EXPL: 1

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. La especificación UPnP de Open Connectivity Foundation antes del 17-04-2020 no prohíbe la aceptación de una petición de suscripción con una URL de entrega en un segmento de red diferente a la URL de suscripción de evento totalmente calificada, también se conoce como el problema de CallStranger • https://github.com/yunuscadirci/CallStranger http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html http://www.openwall.com/lists/oss-security/2020/06/08/2 https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek https://github.com/corelight/callstranger-detector https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html https://lists.debian.org/debian-l • CWE-276: Incorrect Default Permissions CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.0EPSS: 9%CPEs: 3EXPL: 1

Directory traversal vulnerability on Huawei HG532e, HG532n, and HG532s devices allows remote attackers to read arbitrary files via a .. (dot dot) in an icon/ URI. Vulnerabilidad de salto de directorio en dispositivos Huawei HG532e, HG532n y HG532s permite a atacantes remotos leer archivos arbitrarios a traves de .. (punto punto) en una URI icon/. • https://www.exploit-db.com/exploits/45991 http://www.huawei.com/en/psirt/security-advisories/hw-462908 http://www.kb.cert.org/vuls/id/438928 http://www.securityfocus.com/bid/77506 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-462908.htm https://github.com/0xAdrian/scripts/blob/master/2015_7254_exploit.py • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •