Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Low

CVE-2011-2763

Disclosure Date: September 02, 2011 (last updated October 04, 2023)
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.
0
Attacker Value
Unknown

CVE-2019-3702

Disclosure Date: May 13, 2019 (last updated November 27, 2024)
A Remote Code Execution issue in the DNS Query Web UI in Lifesize Icon LS_RM3_3.7.0 (2421) allows remote authenticated attackers to execute arbitrary commands via a crafted DNS Query address field in a JSON API request.
0
Attacker Value
Unknown

CVE-2019-7632

Disclosure Date: February 08, 2019 (last updated November 27, 2024)
LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lifesize default password for the cli account may sometimes be used for authentication.
0
Attacker Value
Unknown

CVE-2018-17981

Disclosure Date: November 12, 2018 (last updated February 21, 2025)
Lifesize Express ls ex2_4.7.10 2000 (14) devices allow XSS via the interface/interface.php brand parameter.
Attacker Value
Unknown

CVE-2011-2762

Disclosure Date: September 02, 2011 (last updated October 04, 2023)
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) allows remote attackers to bypass authentication via unspecified data associated with a "true" authentication status, related to AMF data and the LSRoom_Remoting.authenticate function in gateway.php.
0