VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201905-1325 No CVE Memory corruption vulnerability in SAMSoar Developer CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
SAMSoar Developer is a configuration software produced by Shenzhen Xiankong Technology Co., Ltd. SAMSoar Developer has a memory corruption vulnerability when processing ssp project files. Attackers can use this vulnerability to gain control of the user system or crash the program
VAR-201905-1338 No CVE Display Control Remote HMI has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Display Control Remote HMI is a configuration software produced by Shenzhen Display Control Technology Co., Ltd. Display Control Remote HMI has a memory corruption vulnerability when processing smc project files. Attackers can use this vulnerability to gain control of the user system or crash the program
VAR-201905-1341 No CVE Display Control Remote HMI has dll hijacking vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Shenzhen Xiankong Technology is a national high-tech enterprise specializing in R & D, production, sales and service of core products of Industry 4.0. Display Control Remote HMI has dll hijacking vulnerability. An attacker can maliciously load and execute a DLL by constructing a malicious application and placing it in a specific path. DLL And execute
VAR-201905-1349 No CVE xp-builder has dll hijacking vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
xp-builder is an XGT HMI editing software. There is a dll hijacking vulnerability in xp-builder, which can be used by an attacker to execute malicious code
VAR-201905-1348 No CVE KGL_WIN has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
KGL_WIN is a PLC programming software. KGL_WIN has a memory corruption vulnerability when processing kpr project files. Attackers can use this vulnerability to gain control of the user system or crash the program
VAR-201905-1339 No CVE SKWorkshop has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
SKWorkshop is a configuration software produced by Shenzhen Xiankong Technology Co., Ltd. SKWorkshop has a memory corruption vulnerability when processing shm project files. Attackers can use this vulnerability to gain control of the user system or crash the program
VAR-201905-1351 No CVE xp-builder has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
xp-builder is an XGT HMI editing software. There is a memory corruption vulnerability when xp-builder processes xpd project files. Attackers can use this vulnerability to execute malicious code on user systems
VAR-201905-1337 No CVE SKTOOL has a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
SKTOOL is a configuration software produced by Shenzhen Xiankong Technology Co., Ltd. SKTOOL has a memory corruption vulnerability when processing skm project files. Attackers can use this vulnerability to gain control of the user system or crash the program
VAR-201905-1352 No CVE Memory corruption vulnerability in LSIS configuration software CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
LSIS configuration software is a configuration software of Lexing Power Generation (Wuxi) Co., Ltd. A memory corruption vulnerability exists in the LSIS configuration software when processing mce project files. Attackers can use this vulnerability to execute malicious code
VAR-201905-1436 No CVE DoS Vulnerability in Hitachi IT Operations Director, JP1/IT Desktop Management - Manager and JP1/IT Desktop Management 2 - Manager CVSS V2: -
CVSS V3: -
Severity: -
A DoS Vulnerability was found in Hitachi IT Operations Director, JP1/IT Desktop Management - Manager and JP1/IT Desktop Management 2 - Manager. Regarding the impact of the vulnerability, please refer to the vendor advisory.
VAR-201905-1299 CVE-2019-12167 Emerson Network Power Liebert Challenger Device cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
httpGetSet/httpGet.htm on Emerson Network Power Liebert Challenger 5.1E0.5 devices allows XSS via the statusstr parameter. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Liebert Challenger 5.1E0.5 is vulnerable; other versions may also be affected. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201905-1432 No CVE There are binary loopholes between Xiaomi Xiaoai MINI smart speaker and Xiaomi Xiaoai AI smart speaker voice device CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Xiaomi Xiaoai MINI smart speaker and Xiaomi Xiaoai AI smart speaker are both smart speaker products produced by Xiaomi Technology. There is a binary vulnerability between the Xiaomi Xiaoai MINI smart speaker and Xiaomi Xiaoai AI smart speaker voice device. Attackers can use this vulnerability to obtain the user's voice content.
VAR-201905-0005 CVE-2019-4293 IBM Storwize V7000 Unified Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
IBM Storwize V7000 Unified (2073) 1.6 configuration may allow an attacker to reveal the server version in default installation, which could be used in further attacks against the system. IBM X-Force ID: 160699. IBM Storwize V7000 Unified Contains an information disclosure vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 160699 It is released as.Information may be obtained. IBMStorwizeV7000Unified is a virtualized storage device from IBM Corporation of the United States. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks
VAR-201906-0680 CVE-2019-11983 HPE Integrated Lights-Out 4 and Integrated Lights-Out 5 Buffer error vulnerability CVSS V2: 8.3
CVSS V3: 7.0
Severity: HIGH
A remote buffer overflow vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39. HP Integrated Lights-Out is prone to following security vulnerabilities: 1. A buffer-overflow vulnerability 2. Multiple unspecified cross-site scripting vulnerabilities An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks, execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This solution enables remote monitoring and operation and maintenance of IT assets such as servers. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
VAR-201906-0679 CVE-2019-11982 HPE Integrated Lights-Out 4 and Integrated Lights-Out 5 Vulnerable to cross-site scripting CVSS V2: 7.6
CVSS V3: 8.3
Severity: HIGH
A remote cross site scripting vulnerability was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than v2.61b for Gen9 servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers earlier than version v1.39. HP Integrated Lights-Out is prone to following security vulnerabilities: 1. A buffer-overflow vulnerability 2. Multiple unspecified cross-site scripting vulnerabilities An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks, execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. HPE Integrated Lights-Out is a set of remote control solutions from Hewlett Packard Enterprise (HPE). This solution enables remote monitoring and operation and maintenance of IT assets such as servers. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201905-1300 CVE-2019-12168 Four-Faith Wireless Mobile Router F3x24 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen. Four-Faith Wireless Mobile Router F3x24 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Four-Faith WirelessMobileRouter F3x24 is a portable wireless mobile router from China's Four-Faith. A code execution vulnerability exists in the Four-Faith WirelessMobileRouter F3x24v1.0 release, which can be exploited by a remote attacker using the CommandShell interface
VAR-201905-1346 No CVE DLL hijacking vulnerability in INVT PanelSim CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Shenzhen INVT Electric Co., Ltd. is specialized in the fields of industrial automation and energy power. DLL hijacking vulnerability exists in INVT PanelSim when processing pl3 project files. Attackers can use the vulnerability to load malicious DLLs and execute malicious code
VAR-201905-1342 No CVE KUNBUS-GW Ethernet / IP Denial of Service Vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
KUNBUS-GW Ethernet / IP is a programmable logic controller (PLC), which provides an integrated ControlNet communication port and two integrated Ethernet interfaces. There is a denial of service vulnerability in KUNBUS-GW Ethernet / IP. An attacker can use this vulnerability to bring down the device by sending a specific arp protocol packet
VAR-201905-1078 CVE-2019-11057 Vtiger CRM In SQL Injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
SQL injection vulnerability in Vtiger CRM before 7.1.0 hotfix3 allows authenticated users to execute arbitrary SQL commands. Vtiger CRM is a customer relationship management system (CRM) based on SugarCRM developed by American Vtiger Company. The management system provides functions such as management, collection, and analysis of customer information. The vulnerability stems from the lack of verification of externally input SQL statements in database-based applications
VAR-201906-0355 CVE-2019-5215 Huawei P30 Smartphone and P30 Pro Input validation vulnerability CVSS V2: 4.3
CVSS V3: 6.8
Severity: MEDIUM
There is a man-in-the-middle (MITM) vulnerability on Huawei P30 smartphones versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1), and P30 Pro versions before VOG-AL00 9.1.0.162 (C01E160R1P12/C01E160R2P1). When users establish connection and transfer data through Huawei Share, an attacker could sniff, spoof and do a series of operations to intrude the Huawei Share connection and launch a man-in-the-middle attack to obtain and tamper the data. (Vulnerability ID: HWPSIRT-2019-03109)