Multiple cross-site scripting (XSS) vulnerabilities in Y-Cam camera models SD range YCB003, YCK003, and YCW003; S range YCB004, YCK004, YCW004; EyeBall YCEB03; Bullet VGA YCBL03 and YCBLB3; Bullet HD 720 YCBLHD5; Y-cam Classic Range YCB002, YCK002, and YCW003; and Y-cam Original Range YCB001, YCW001, running firmware 4.30 and earlier, allow remote authenticated users to inject arbitrary web script or HTML via the (1) SYSCONTACT parameter to form/identityApply, as triggered using en/identity.asp; (2) PASSWD parameter to form/accAdd, as triggered using en/account/accedit.asp; (3) NTPSERVER parameter to form/clockApply, as triggered using en/clock.asp; (4) SERVER parameter to form/smtpclientApply, as triggered using en/smtpclient.asp; (5) SERVER parameter to form/ftpApply, as triggered using en/ftp.asp; or (6) SERVER parameter to form/httpEventApply, as triggered using en/httpevent.asp.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Y-cam
Subscribe
|
Ycb001
Subscribe
Ycb001 Firmware
Subscribe
Ycb002
Subscribe
Ycb002 Firmware
Subscribe
Ycb003
Subscribe
Ycb003 Firmware
Subscribe
Ycb004
Subscribe
Ycb004 Firmware
Subscribe
Ycbl03
Subscribe
Ycbl03 Firmware
Subscribe
Ycblb3
Subscribe
Ycblb3 Firmware
Subscribe
Ycblhd5
Subscribe
Ycblhd5 Firmware
Subscribe
Yceb03
Subscribe
Yceb03 Firmware
Subscribe
Yck002
Subscribe
Yck002 Firmware
Subscribe
Yck003
Subscribe
Yck003 Firmware
Subscribe
Yck004
Subscribe
Yck004 Firmware
Subscribe
Ycw001
Subscribe
Ycw001 Firmware
Subscribe
Ycw002
Subscribe
Ycw002 Firmware
Subscribe
Ycw003
Subscribe
Ycw003 Firmware
Subscribe
Ycw004
Subscribe
Ycw004 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-1964 | Multiple cross-site scripting (XSS) vulnerabilities in Y-Cam camera models SD range YCB003, YCK003, and YCW003; S range YCB004, YCK004, YCW004; EyeBall YCEB03; Bullet VGA YCBL03 and YCBLB3; Bullet HD 720 YCBLHD5; Y-cam Classic Range YCB002, YCK002, and YCW003; and Y-cam Original Range YCB001, YCW001, running firmware 4.30 and earlier, allow remote authenticated users to inject arbitrary web script or HTML via the (1) SYSCONTACT parameter to form/identityApply, as triggered using en/identity.asp; (2) PASSWD parameter to form/accAdd, as triggered using en/account/accedit.asp; (3) NTPSERVER parameter to form/clockApply, as triggered using en/clock.asp; (4) SERVER parameter to form/smtpclientApply, as triggered using en/smtpclient.asp; (5) SERVER parameter to form/ftpApply, as triggered using en/ftp.asp; or (6) SERVER parameter to form/httpEventApply, as triggered using en/httpevent.asp. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T09:58:15.951Z
Reserved: 2014-02-07T00:00:00.000Z
Link: CVE-2014-1902
No data.
Status : Deferred
Published: 2015-05-14T00:59:02.537
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-1902
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD