CVE-2014-8024

The API in the Guest Server in Cisco Jabber, when the HTML5 CORS feature is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST request, aka Bug ID CSCus19789.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:jabber_guest:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024 - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024 - Vendor Advisory
References () http://www.securityfocus.com/bid/71770 - () http://www.securityfocus.com/bid/71770 -
References () http://www.securitytracker.com/id/1031422 - () http://www.securitytracker.com/id/1031422 -
References () https://tools.cisco.com/security/center/viewAlert.x?alertId=36870 - () https://tools.cisco.com/security/center/viewAlert.x?alertId=36870 -

Information

Published : 2014-12-23 02:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8024

Mitre link : CVE-2014-8024

CVE.ORG link : CVE-2014-8024


JSON object : View

Products Affected

cisco

  • jabber_guest
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor