VARIoT IoT vulnerabilities database
| VAR-201902-0428 | CVE-2019-1664 | Cisco HyperFlex Software access control vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the hxterm service of Cisco HyperFlex Software could allow an unauthenticated, local attacker to gain root access to all nodes in the cluster. The vulnerability is due to insufficient authentication controls. An attacker could exploit this vulnerability by connecting to the hxterm service as a non-privileged, local user. A successful exploit could allow the attacker to gain root access to all member nodes of the HyperFlex cluster. This vulnerability affects Cisco HyperFlex Software Releases prior to 3.5(2a).
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions.
This issue is being tracked by Cisco Bug ID CSCvk31047. The system provides unified computing, storage and network through cloud management, and provides enterprise-level data management and optimization services
| VAR-201902-0422 | CVE-2019-1666 | Cisco HyperFlex Software access control vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the Graphite service of Cisco HyperFlex software could allow an unauthenticated, remote attacker to retrieve data from the Graphite service. The vulnerability is due to insufficient authentication controls. An attacker could exploit this vulnerability by sending crafted requests to the Graphite service. A successful exploit could allow the attacker to retrieve any statistics from the Graphite service. Versions prior to 3.5(2a) are affected. Cisco HyperFlex There is an access control vulnerability in the software.Information may be obtained.
An attacker can exploit this issue to access arbitrary files in the context of the application, which may aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCvj95580. Cisco HyperFlex Software is a set of scalable distributed file systems from Cisco. The system provides unified computing, storage and network through cloud management, and provides enterprise-level data management and optimization services
| VAR-201902-0136 | CVE-2019-6555 | Horner Automation Cscape CSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Cscape, 9.80 SP4 and prior. An improper input validation vulnerability may be exploited by processing specially crafted POC files. This may allow an attacker to read confidential information and remotely execute arbitrary code. Cscape Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of CSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure.
Horner Automation Cscape version 9.80 SP4 and prior are vulnerable
| VAR-201902-0133 | CVE-2019-6547 | CNCSoft ScreenEditor Vulnerable to out-of-bounds reading |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Delta Industrial Automation CNCSoft, CNCSoft ScreenEditor Version 1.00.84 and prior. An out-of-bounds read vulnerability may cause the software to crash due to lacking user input validation for processing project files. CNCSoft ScreenEditor Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPB files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.
Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users
| VAR-201902-0924 | No CVE | Multiple Manufacturers IP Camera Unauthorized Remote Command Execution Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Avidsen, RTJ, TENVIS and other manufacturers webcam. An unauthorized remote command execution vulnerability exists in multiple vendors IPCamera. A remote attacker can execute arbitrary commands on the device without authorization.
| VAR-201902-0693 | CVE-2018-9867 | SonicWall SonicOS Access control vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
In SonicWall SonicOS, administrators without full permissions can download imported certificates. Occurs when administrators who are not in the SonicWall Administrators user group attempt to download imported certificates. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). SonicWall SonicOS Contains an access control vulnerability.Information may be obtained. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
| VAR-201902-0494 | CVE-2018-12159 | Intel(R) PROSet Wireless Buffer error vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access. Intel(R) PROSet Wireless Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel PROSet Wireless is a driver for Intel PROSet wireless network card produced by Intel Corporation. A local attacker could exploit this vulnerability to cause a denial of service
| VAR-201905-0469 | CVE-2019-8387 | MASTER IPCAMERA01 Command injection vulnerability in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
MASTER IPCAMERA01 3.3.4.2103 devices allow Remote Command Execution, related to the thttpd component. MASTER IPCAMERA01 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Master IP CAM 01 is a network camera. A command injection vulnerability exists in Master IP CAM 01 version 3.3.4.2103. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data. Attackers can exploit this vulnerability to execute illegal commands
| VAR-201906-0052 | CVE-2019-5281 | Huawei Y9 2019 Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
There is an information leak vulnerability in some Huawei phones, versions earlier than Jackman-L21 8.2.0.155(C185R1P2). When a local attacker uses the camera of a smartphone, the attacker can exploit this vulnerability to obtain sensitive information by performing a series of operations. Huawei Smartphones contain information disclosure vulnerabilities.Information may be obtained. Huawei Y9 2019 is a smartphone from China's Huawei
| VAR-201902-0374 | CVE-2019-8413 | Xiaomi MIX 2 In the device NULL Pointer dereference vulnerability |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
On Xiaomi MIX 2 devices with the 4.4.78 kernel, a NULL pointer dereference in the ioctl interface of the device file /dev/elliptic1 or /dev/elliptic0 causes a system crash via IOCTL 0x4008c575 (aka decimal 1074316661). Xiaomi MIX 2 is a smartphone from the Chinese company Xiaomi. Attackers can exploit this vulnerability to crash the system
| VAR-201902-0344 | CVE-2019-8392 | D-Link DIR-823G Vulnerability related to access control in device firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the web service provided by /bin/goahead. D-Link DIR-823G There is an access control vulnerability in the device firmware.Information may be tampered with. D-LinkDIR-823G is an AC1200M dual-band Gigabit wireless router
| VAR-201903-0208 | CVE-2019-7386 | KaiOS and Nokia 8810 4G Device buffer error vulnerability |
CVSS V2: 7.1 CVSS V3: 6.5 Severity: MEDIUM |
A Denial of Service issue has been discovered in the Gecko component of KaiOS 2.5 10.05 (platform 48.0.a2) on Nokia 8810 4G devices. When a crafted web page is visited with the internal browser, the Gecko process crashes with a segfault. Successful exploitation could lead to the remote code execution on the device. KaiOS and Nokia 8810 4G The device contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Nokia 88104G is a generation of banana models. An attacker could exploit the vulnerability to execute code or cause a denial of service with a specially crafted page. HMD Nokia 8810 4G is a 4G mobile phone from HMD Finland
| VAR-201903-1285 | CVE-2018-19525 | plural Systrome Cumilon ISG Cross-site request forgery vulnerability in device products |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An issue was discovered on Systrome ISG-600C, ISG-600H, and ISG-800W 1.1-R2.1_TRUNK-20180914.bin devices. There is CSRF via /ui/?g=obj_keywords_add and /ui/?g=obj_keywords_addsave with resultant XSS because of a lack of csrf token validation. Systrome Cumilon ISG-600C , ISG-600H , ISG-800W The device contains a cross-site request forgery vulnerability.Information may be obtained and information may be altered. SYSTORME ISG-600C is an integrated security gateway device of India SYSTORME company. A remote attacker could exploit this vulnerability to take control of the account
| VAR-201905-0420 | CVE-2019-7745 | JioFi 4 jmr1140 Vulnerabilities related to certificate and password management in devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain the Wi-Fi password by making a cgi-bin/qcmap_web_cgi Page=GetWiFi_Setting request and then reading the wpa_security_key field. JioFi 4 jmr1140 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Reliance Jio Infocomm JioFi 4 jmr1140 is a portable wireless router device from Reliance Jio Infocomm in Australia. There is a trust management issue vulnerability in Reliance Jio Infocomm JioFi 4 jmr1140 Amtel_JMR1140_R12.07 version. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components
| VAR-201905-0421 | CVE-2019-7746 | JioFi 4 jmr1140 Device cross-site request forgery vulnerability |
CVSS V2: 4.3 CVSS V3: 8.1 Severity: HIGH |
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain an admin token by making a /cgi-bin/qcmap_auth type=getuser request and then reading the token field. This token value can then be used to change the Wi-Fi password or perform a factory reset. JioFi 4 jmr1140 The device contains a cross-site request forgery vulnerability.Information may be obtained and information may be altered. Reliance Jio Infocomm JioFi 4 jmr1140 is a portable wireless router device from Reliance Jio Infocomm in Australia. The vulnerability stems from the WEB application not adequately verifying that the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client
| VAR-201905-0418 | CVE-2019-7687 | JioFi 4 jmr1140 Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
cgi-bin/qcmap_web_cgi on JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices has POST based reflected XSS via the Page parameter. No sanitization is performed for user input data. JioFi 4 jmr1140 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Reliance Jio Infocomm JioFi 4 jmr1140 is a portable wireless router device from Reliance Jio Infocomm in Australia. A cross-site scripting vulnerability exists in cgi-bin/qcmap_web_cgi in Reliance Jio Infocomm JioFi 4 jmr1140. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-201903-1467 | CVE-2019-0657 | plural Microsoft Vulnerability related to input validation in products |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'. plural Microsoft The product includes URL There is a vulnerability related to input validation due to incomplete analysis method.
An attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security update for February 2019
Advisory ID: RHSA-2019:0349-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0349
Issue date: 2019-02-14
CVE Names: CVE-2019-0657
====================================================================
1. Summary:
Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, and rh-dotnet22-dotnet are now available for
.NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
.NET Core is a managed-software framework. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation.
New versions of .NET Core that address security vulnerabilities are now
available. The updated versions are .NET Core 1.0.14, 1.1.11, 2.1.8, and
2.2.2.
Security Fix(es):
* .dotnet: Domain-spoofing attack in System.Uri (CVE-2019-0657)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
For more information, please refer to the upstream doc in the References
section.
4. Solution:
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1673891 - CVE-2019-0657 dotnet: Domain-spoofing attack in System.Uri
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.14-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.11-2.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet21-2.1-7.el7.src.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.src.rpm
x86_64:
rh-dotnet21-2.1-7.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet22-2.2-3.el7.src.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-3.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.14-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.11-2.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-2.1-7.el7.src.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.src.rpm
x86_64:
rh-dotnet21-2.1-7.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet22-2.2-3.el7.src.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-3.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.14-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.14-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.11-2.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.11-2.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-2.1-7.el7.src.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.src.rpm
x86_64:
rh-dotnet21-2.1-7.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.8-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.504-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet22-2.2-3.el7.src.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-3.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.2-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.104-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-3.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-0657
https://access.redhat.com/security/updates/classification/#moderate
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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IIGV
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201903-1269 | CVE-2019-0741 | Azure IoT Java SDK Vulnerability in which information is disclosed |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An information disclosure vulnerability exists in the way Azure IoT Java SDK logs sensitive information, aka 'Azure IoT Java SDK Information Disclosure Vulnerability'. A remote attacker could use this vulnerability to obtain information
| VAR-201903-0207 | CVE-2019-7385 | plural Raisecom ISCOM Command injection vulnerabilities in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device. plural Raisecom ISCOM The product contains a command injection vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Multiple Raisecom GPON Products are prone to an local command-injection vulnerability.
An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Raisecom Technology GPON-ONU HT803G-07 is a modem from China Raisecom Technology. There is a command injection vulnerability in the 'newpass' and 'confpass' parameters of /bin/WebMGR in Raisecom Technology GPON-ONU HT803G-07. An attacker could exploit this vulnerability to execute code
| VAR-201903-0206 | CVE-2019-7384 | plural Raisecom ISCOM Command injection vulnerability in the product |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below. The value of the fmgpon_loid parameter is used in a system call inside the boa binary. Because there is no user input validation, this leads to authenticated code execution on the device. plural Raisecom ISCOM The product contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Raisecom GPON Products are prone to an local command-injection vulnerability.
An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Raisecom Technology GPON-ONU HT803G-07 is a modem from China Raisecom Technology. A command injection vulnerability exists in the 'fmgpon_loid' parameter in Raisecom Technology GPON-ONU HT803G-07. An attacker could exploit this vulnerability to execute code