Show filters
42 Total Results
Displaying 21-30 of 42
Sort by:
Attacker Value
Unknown
CVE-2017-2912
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the goclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2916
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an arbitrary file to be overwritten. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2917
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the notifications functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12083
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable information disclosure vulnerability exists in the apid daemon of the Circle with Disney running firmware 2.0.1. A specially crafted set of packets can make the Disney Circle dump strings from an internal database into an HTTP response. An attacker needs network connectivity to the Internet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2882
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the servers update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to overwrite sensitive files, resulting in code execution. An attacker needs to impersonate a remote server in order to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12096
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi management of Circle with Disney. A crafted Access Point with the same name as the legitimate one can be used to make Circle connect to an untrusted network. An attacker needs to setup an Access Point reachable by the device and to send a series of spoofed "deauth" packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12084
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulting in a persistent backdoor. An attacker can send an API call to enable the SSH server.
0
Attacker Value
Unknown
CVE-2017-2864
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the generation of authentication token functionality of Circle with Disney. Specially crafted network packets can cause a valid authentication token to be returned to the attacker resulting in authentication bypass. An attacker can send a series of packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2898
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2014-5918
Disclosure Date: September 17, 2014 (last updated October 05, 2023)
The Secret Circle - talk freely (aka com.easyxapp.secret) application 2.2.00.26 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0