VARIoT IoT exploits database

Affected products: vendor, model and version
Type can be e.g: Remote Code Execution or Denial of Service
Look up free text in title and description

VAR-E-200410-0228 CVE-2004-0834
Speedtouch USB Driver Local Format String Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200412-0016
No EDB ID
Speedtouch USB Driver is prone to a locally exploitable format string vulnerability. The problem occurs due to insufficient sanitization of user-supplied data. This vulnerability may be exploited in order to have arbitrary code executed with superuser privileges.
VAR-E-200410-0148 No CVE 3Com OfficeConnect ADSL Wireless 11g Firewall Router Multiple Unspecified Vulnerabilities No EDB ID
3Com OfficeConnect ADSL Wireless 11g Firewall Router is reported prone to multiple unspecified vulnerabilities. The following issues were reported: An unspecified issue affects the DHCP service. Another issue is related to displaying two duplicate login IPs. An unspecified denial of service vulnerability may allow remote attackers to restart the device. This issue occurs due to insufficient boundary checks performed by the application. 3Com OfficeConnect ADSL Wireless 11g Firewall Router firmware versions prior to 1.27 are vulnerable to these issues. **UPDATE: it should be noted that the issue described as an error in displaying two duplicate IPs has been assigned it own BID as more information has become available. Please see '3Com OfficeConnect ADSL Wireless 11g Firewall Router Authentication Bypass Vulnerability' (BID 11438) for more information.
VAR-E-200408-0248 CVE-2004-1464
Cisco IOS Telnet Service Remote Denial of Service Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200412-0177
No EDB ID
Cisco IOS telnet service is reported prone to a remote denial of service vulnerability. It is reported that an attacker can trigger this issue by sending a specially crafted TCP packet to a telnet or reverse telnet port of a Cisco device running IOS. All Cisco devices running IOS with a telnet or reverse telnet service are affected by this issue.
VAR-E-200408-0045 No CVE Axis Network Camera 2.x And Video Server 1-3 - Directory Traversal - CGI webapps Exploit EDB ID: 24401
Axis Network Camera 2.x And Video Server 1-3 - Directory Traversal.. webapps exploit for CGI platform
VAR-E-200408-0044 No CVE Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass - CGI webapps Exploit EDB ID: 24402
Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass.. webapps exploit for CGI platform
VAR-E-200408-0043 CVE-2004-2425
Axis Network Camera 2.x And Video Server 1-3 - 'virtualinput.cgi' Arbitrary Command Execution - CGI webapps Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200412-0391
EDB ID: 24400
Axis Network Camera 2.x And Video Server 1-3 - 'virtualinput.cgi' Arbitrary Command Execution. CVE-2004-2425CVE-9121 . webapps exploit for CGI platform
VAR-E-200408-0035 No CVE Cisco IOS OSPF Remote Denial Of Service Vulnerability No EDB ID
Cisco IOS is reported prone to a remote denial of service vulnerability. It is reported that the vulnerability manifests when a malformed Open Shortest Path First (OSPF) packet is handled by the vulnerable router. A remote attacker may exploit this condition in multiple routers that reside on the same network segment as the attacker, to trigger a device reset. The attacker may continuously transmit malicious OSPF packets to the target routers in order to effectively deny network services to legitimate hosts.
VAR-E-200407-0196 CVE-2004-0699
Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200409-0025
No EDB ID
A remote buffer overflow vulnerability is reported in Check Point VPN-1 that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. This issue results from insufficient boundary checks performed by the application when processing user-supplied data. This overflow occurs during the initial key exchange process, and can be triggered with a single UDP packet. Since ISAKMP uses the UDP transport, a spoofed source address can be used in an attack. Check Point reports that for a single packet attack to succeed, VPN-1 must be configured for aggressive mode key exchange. Without aggressive mode, an attacker must initiate a real key negotiation session. This vulnerability can lead to remote code execution in the context of the VPN-1 process. This can lead to a complete system compromise. Check Point has released an advisory and fixes for this issue.
VAR-E-200406-0043 CVE-2004-0493
Apache - Arbitrary Long HTTP Headers Denial of Service (C) - Linux dos Exploit EDB ID: 371
Apache - Arbitrary Long HTTP Headers Denial of Service (C). CVE-7269CVE-2004-0493 . dos exploit for Linux platform
VAR-E-200406-0084 CVE-2004-0589
Cisco IOS Border Gateway Protocol Denial Of Service Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200408-0075
No EDB ID
The problem presents itself when an affected device handles a malformed or invalid Border Gateway Protocol (BGP) packet. During processing the offending packet the affected device will reset. It should be noted that this issue only affects devices with BGP enabled; BGP is not enabled by default. It has been reported that this issue would be very difficult to exploit as it would require injecting malicious packets into communication between trusted peers. An attacker may exploit this issue to cause the affected device to reset, taking several minutes to become functional. It is possible to create a persistent denial of service condition by continually transmitting malformed packets to the affected device.
VAR-E-200405-0121 CVE-2004-0580
Linksys - DHCP Information Disclosure - Hardware remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200408-0079
EDB ID: 24115
Linksys - DHCP Information Disclosure. CVE-2004-0580CVE-6741 . remote exploit for Hardware platform
VAR-E-200404-0002 CVE-2004-0230
CVE-2004-0790
CVE-2004-1060
CVE-2005-0688
CVE-2005-0048
CVE-2004-0791
CVE-2005-1649
Microsoft Windows - Malformed IP Options Denial of Service (MS05-019) - Windows dos Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200505-0723, VAR-200503-0010, VAR-200504-0003, VAR-200504-0002, VAR-200404-0081, VAR-200408-0145
EDB ID: 942
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
VAR-E-200404-0006 CVE-2004-0230
CVE-2014-8523
Multiple Vendor - TCP Sequence Number Approximation (4) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200408-0145
EDB ID: 24033
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
VAR-E-200404-0128 CVE-2004-0714
Cisco Internet Operating System SNMP Message Processing Denial Of Service Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200407-0001
No EDB ID
It has been reported that the Cisco Internet Operating System (IOS) is affected by a remote SNMP message processing denial of service vulnerability. This is caused by a design error that causes memory corruption in the affected system under certain circumstances. This issue may be leveraged to cause a denial of service condition in the affected device. The denial of service is due to a corruption of memory in the affected device. As a result, there may be other consequences, such as code execution. This has not been confirmed by Cisco.
VAR-E-200404-0004 CVE-2004-0230
CVE-2014-8523
Multiple Vendor - TCP Sequence Number Approximation (3) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200408-0145
EDB ID: 24032
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
VAR-E-200404-0001 CVE-2004-0230
CVE-2014-8523
Multiple Vendor - TCP Sequence Number Approximation (2) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200408-0145
EDB ID: 24031
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
VAR-E-200403-0022 CVE-2004-0230
CVE-2014-8523
Multiple Vendor - TCP Sequence Number Approximation (1) - Multiple remote Exploit

Related entries in the VARIoT vulnerabilities database: VAR-200408-0145
EDB ID: 24030
Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.
VAR-E-200403-0269 CVE-2004-0171
BSD Out Of Sequence Packets Remote Denial Of Service Vulnerability

Related entries in the VARIoT vulnerabilities database: VAR-200403-0072
No EDB ID
A problem in the handling of out-of-sequence packets has been identified in BSD variants such as FreeBSD and OpenBSD. Because of this, it may be possible for remote attackers to deny service to legitimate users of vulnerable systems.
VAR-E-200312-0060 No CVE Multiple Cisco FWSM Vulnerabilities No EDB ID
Cisco has reported the following vulnerabilities in Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 Series and Cisco 7600 Series: Cisco FWSM is prone to a buffer overrun vulnerability when handling HTTP Auth data. This would most likely result in a denial of service but could also potentially allow for arbitrary code execution (though this has not been confirmed). Cisco FWSM has also been reported to be prone to denial of service attacks via SNMPv3 messages. This will cause a vulnerable device to reboot. Both of these issues have been addressed in FWSM 1.1.3 and later for affected devices.
VAR-E-200311-0086 No CVE Traceroute Detection Security Tool Remote Format String Vulnerability No EDB ID
A remote format string vulnerability has been discovered in the detecttr.c traceroute detection tool, initially released in Phrack magazine. The problem occurs due to erroneous usage of the syslog() function, potentially making it prone to format string attacks via malformed hostnames. Successful exploitation of this issue could allow an attacker to execute arbitrary code on a vulnerable system with the privileges of the user invoking detecttr.