VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-0832 CVE-2019-7485 SonicWall SMA100 Vulnerable to classic buffer overflow CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Buffer overflow in SonicWall SMA100 allows an authenticated user to execute arbitrary code in DEARegister CGI script. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. SonicWall SMA100 Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. This vulnerability is caused by a network system or product performing incorrect operations on the memory and incorrectly verifying the data boundaries, resulting in incorrect reads and writes to associated memory locations. Operation, an attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-1549 CVE-2019-18995 ABB PB610 Panel Builder 600 Input validation vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The HMISimulator component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier fails to validate the content-length field for HTTP requests, exposing HMISimulator to denial of service via crafted HTTP requests manipulating the content-length setting. ABB PB610 Panel Builder 600 Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ABB PB610 Panel Builder 600 is a software that designs a graphical user interface for the CP600 control panel platform. The vulnerability stems from the failure of the network system or product to properly validate the input data
VAR-201912-1731 CVE-2019-11400 plural TRENDnet Buffer error vulnerability in product devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. A buffer overflow occurs through the get_set.ccp ccp_act parameter. TRENDnet TEW-651BR , TEW-652BRP , TEW-652BRU The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnet TEW-651BR and others are all wireless routers from TRENDnet. A buffer overflow vulnerability exists in TRENDnet TEW-651BR version 2.04B1, TEW-652BRP version 3.04b01, and TEW-652BRU version 1.00b12. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be associated with other memory locations
VAR-201912-0063 CVE-2019-5265 Huawei P30 Access Control Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Huawei Share function in P30 9.1.0.193(C00E190R2P1) smartphone has an improper access control vulnerability. The function incorrectly controls certain access messages, attackers can simulate a sender to steal P2P network information. Successful exploit may cause information leakage. The Huawei P30 is a smartphone from China's Huawei
VAR-201912-0830 CVE-2019-7483 SonicWall SMA100 Path Traversal Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In SonicWall SMA100, an unauthenticated Directory Traversal vulnerability in the handleWAFRedirect CGI allows the user to test for the presence of a file on the server. SonicWall SMA100 Contains a path traversal vulnerability.Information may be obtained. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. The vulnerability stems from a network system or product's failure to properly filter special elements in a resource or file path. An attacker could use this vulnerability to access locations outside the restricted directory
VAR-201912-1551 CVE-2019-18997 ABB PB610 Panel Builder 600 Vulnerable to unauthorized authentication CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The HMISimulator component of ABB PB610 Panel Builder 600 uses the readFile/writeFile interface to manipulate the work file. Path configuration in PB610 HMISimulator versions 2.8.0.424 and earlier potentially allows access to files outside of the working directory, thus potentially supporting unauthorized file access. PB610 HMISimulator is one of the PB610 simulator components
VAR-201912-1548 CVE-2019-18994 ABB PB610 Panel Builder 600 Input validation vulnerability CVSS V2: 3.5
CVSS V3: 6.5
Severity: MEDIUM
Due to a lack of file length check, the HMIStudio component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier crashes when trying to load an empty *.JPR application file. An attacker with access to the file system might be able to cause application malfunction such as denial of service. ABB PB610 Panel Builder 600 Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ABB PB610 Panel Builder 600 is a software that designs a graphical user interface for the CP600 control panel platform. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. ABB CP651 HMI has a vulnerability in trust management issues
VAR-201912-0064 CVE-2019-5266 Huawei P30 Input Validation Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Huawei Share function in P30 9.1.0.193(C00E190R2P1) smartphone has an insufficient input validation vulnerability. Attackers can exploit this vulnerability by sending crafted packets to the affected device. Successful exploit may cause the function will be disabled. The Huawei P30 is a smartphone from China's Huawei
VAR-201912-0829 CVE-2019-7482 SonicWall SMA100 Vulnerable to out-of-bounds writing CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Stack-based buffer overflow in SonicWall SMA100 allows an unauthenticated user to execute arbitrary code in function libSys.so. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. SonicWall SMA100 Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. SonicWall SMA100 has a buffer overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-0833 CVE-2019-7486 SonicWall SMA100 Code Injection Vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Code injection in SonicWall SMA100 allows an authenticated user to execute arbitrary code in viewcacert CGI script. This vulnerability impacted SMA100 version 9.0.0.4 and earlier. SonicWall SMA100 Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. The vulnerability originates from the process of constructing code segments by external input data, and the network system or product does not properly filter the special elements therein. Attackers can use this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components
VAR-201912-1419 CVE-2019-19742 D-Link DIR-615 Device cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
On D-Link DIR-615 devices, the User Account Configuration page is vulnerable to blind XSS via the name field. D-Link DIR-615 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-Link DIR-615 is a wireless router from Taiwan D-Link Corporation. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-201912-1252 CVE-2019-18573 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Session fixation vulnerability in products CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session
VAR-201912-1251 CVE-2019-18572 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Authentication vulnerabilities in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application
VAR-201912-1250 CVE-2019-18571 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Product cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-0834 CVE-2019-7487 SonicOS SSLVPN NACagent Vulnerable to unquoted search paths or elements CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Installation of the SonicOS SSLVPN NACagent 3.5 on the Windows operating system, an autorun value is created does not put the path in quotes, so if a malicious binary by an attacker within the parent path could allow code execution. SonicOS SSLVPN NACagent Contains an unquoted search path or element vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SonicWall SonicOS SSLVPN NACagent is a VPN (Virtual Private Network) client application developed by SonicWall in the United States. A code issue vulnerability exists in SonicOS SSLVPN NACagent version 3.5 (Windows). An attacker could exploit this vulnerability to execute code through malicious binaries
VAR-201912-0107 CVE-2019-8791 Shazam Android and Shazam iOS In the application URL Scheme analysis vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
An issue existed in the parsing of URL schemes. This issue was addressed with improved URL validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to an open redirect. Shazam is a music playback application. The program has functions such as music recognition and playback
VAR-201912-0106 CVE-2019-8849 TSwiftNIO SSL Vulnerable to arbitrary code execution CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The issue was addressed by signaling that an executable stack is not required. This issue is fixed in SwiftNIO SSL 2.4.1. A SwiftNIO application using TLS may be able to execute arbitrary code. A security vulnerability exists in SwiftNIO SSL
VAR-201912-1791 CVE-2019-10614 plural Snapdragon Vulnerability related to out-of-bounds writing in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Out of boundary access is possible as there is no validation of data accessed against the received size of the packet in case of malicious firmware in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201912-1723 CVE-2019-10572 plural Snapdragon Product integer overflow vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Improper check in video driver while processing data from video firmware can lead to integer overflow and then buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201912-1122 CVE-2019-19832 Xerox AltaLink C8035 Printer vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Xerox AltaLink C8035 printers allow CSRF. A request to add users is made in the Device User Database form field to the xerox.set URI. (The frmUserName value must have a unique name.). Xerox AltaLink C8035 Printer contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. A cross-site request forgery vulnerability exists in Xerox AltaLink C8035. The vulnerability stems from the fact that the WEB application did not fully verify whether the request came from a trusted user. An attacker could use this vulnerability to send unexpected requests to the server through the affected client