VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201903-1508 CVE-2019-0632 plural Microsoft Windows Vulnerabilities that bypass security functions in products CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks
VAR-201904-0718 CVE-2018-19006 OSIsoft PI Vision Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
OSIsoft PI Vision, versions PI Vision 2017, and PI Vision 2017 R2, The application contains a cross-site scripting vulnerability where displays that reference AF elements and attributes containing JavaScript are affected. This vulnerability requires the ability of authorized AF users to store JavaScript in AF elements and attributes. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. OSIsoft PI Vision 2017 and PI Vision 2017 R2 are vulnerable
VAR-201902-0359 CVE-2019-8319 D-Link DIR-878 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv4Settings API function, as demonstrated by shell metacharacters in the Gateway field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0355 CVE-2019-8315 D-Link DIR-878 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv4FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv4AddressRangeStart field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0354 CVE-2019-8314 D-Link DIR-878 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetQoSSettings API function, as demonstrated by shell metacharacters in the IPAddress field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0358 CVE-2019-8318 D-Link DIR-878 Command injection vulnerability in device firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysEmailSettings API function, as demonstrated by shell metacharacters in the SMTPServerPort field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0356 CVE-2019-8316 D-Link DIR-878 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetWebFilterSettings API function, as demonstrated by shell metacharacters in the WebFilterURLs field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0352 CVE-2019-8312 D-Link DIR-878 Command injection vulnerability in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysLogSettings API function, as demonstrated by shell metacharacters in the IPAddress field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0353 CVE-2019-8313 D-Link DIR-878 Command injection vulnerability in device firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv6FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv6AddressRangeStart field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201902-0357 CVE-2019-8317 D-Link DIR-878 Command injection vulnerability in device firmware CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv6Settings API function, as demonstrated by shell metacharacters in the DestNetwork field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
VAR-201903-1268 CVE-2019-0729 Azure IoT Java SDK Vulnerability in which privileges are elevated CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An Elevation of Privilege vulnerability exists in the way Azure IoT Java SDK generates symmetric keys for encryption, allowing an attacker to predict the randomness of the key, aka 'Azure IoT Java SDK Elevation of Privilege Vulnerability'. Attackers can use this vulnerability to predict the randomness of keys, obtain keys, and access users' IoT centers. An attacker may exploit this issue to gain elevated privileges. Successful exploits may aid in further attacks
VAR-201902-0717 CVE-2019-0257 SAP NetWeaver AS ABAP Platform Authorization vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Customizing functionality of SAP NetWeaver AS ABAP Platform (fixed in versions from 7.0 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.53, from 7.74 to 7.75) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. SAP NetWeaver AS ABAP Platform Contains an authorization vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SAP ABAP is prone to an authorization-bypass vulnerability. Attackers can exploit this issue to gain unauthorized access and obtain sensitive information. This may aid in further attacks
VAR-201902-0800 CVE-2019-0112 Intel Data Center Manager SDK Input validation vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Improper flow control in crypto routines for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Data Center Manager SDK Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. A local attacker can exploit this issue to crash the operating system, denying service to legitimate users. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0799 CVE-2019-0111 Intel Data Center Manager SDK Vulnerable to information disclosure CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access. A local attacker can exploit this issue to gain elevated privileges on an affected system. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0798 CVE-2019-0110 Intel Data Center Manager SDK Vulnerable to information disclosure CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Insufficient key management for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access. Local attackers can exploit this issue to obtain sensitive information. This may aid in further attacks. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0797 CVE-2019-0109 Intel Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper folder permissions in Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities. An attackers may exploit this issue to gain elevated privileges. Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0796 CVE-2019-0108 Intel Data Center Manager SDK Vulnerable to information disclosure CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable disclosure of information via local access. A local attacker can exploit this issue to gain elevated privileges on an affected system. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0795 CVE-2019-0107 Intel Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Insufficient user prompt in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) Data Center Manager SDK Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities. An attackers may exploit this issue to gain elevated privileges. Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0794 CVE-2019-0106 Intel(R) Data Center Manager SDK Input validation vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Insufficient run protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) Data Center Manager SDK Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities. An attackers may exploit this issue to gain elevated privileges. Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-201902-0793 CVE-2019-0105 Intel(R) Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities. An attackers may exploit this issue to gain elevated privileges. Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment. The vulnerability stems from insufficient checks of file permissions