CVE-2014-8025

The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:jabber_guest:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025 - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025 - Vendor Advisory
References () http://www.securityfocus.com/bid/71768 - () http://www.securityfocus.com/bid/71768 -
References () http://www.securitytracker.com/id/1031422 - () http://www.securitytracker.com/id/1031422 -
References () https://tools.cisco.com/security/center/viewAlert.x?alertId=36871 - () https://tools.cisco.com/security/center/viewAlert.x?alertId=36871 -

Information

Published : 2014-12-23 02:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8025

Mitre link : CVE-2014-8025

CVE.ORG link : CVE-2014-8025


JSON object : View

Products Affected

cisco

  • jabber_guest
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor