VARIoT IoT vulnerabilities database
| VAR-201903-1508 | CVE-2019-0632 | plural Microsoft Windows Vulnerabilities that bypass security functions in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka 'Windows Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0627, CVE-2019-0631.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks
| VAR-201904-0718 | CVE-2018-19006 | OSIsoft PI Vision Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
OSIsoft PI Vision, versions PI Vision 2017, and PI Vision 2017 R2, The application contains a cross-site scripting vulnerability where displays that reference AF elements and attributes containing JavaScript are affected. This vulnerability requires the ability of authorized AF users to store JavaScript in AF elements and attributes.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
OSIsoft PI Vision 2017 and PI Vision 2017 R2 are vulnerable
| VAR-201902-0359 | CVE-2019-8319 | D-Link DIR-878 Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv4Settings API function, as demonstrated by shell metacharacters in the Gateway field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0355 | CVE-2019-8315 | D-Link DIR-878 Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv4FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv4AddressRangeStart field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0354 | CVE-2019-8314 | D-Link DIR-878 Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetQoSSettings API function, as demonstrated by shell metacharacters in the IPAddress field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0358 | CVE-2019-8318 | D-Link DIR-878 Command injection vulnerability in device firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysEmailSettings API function, as demonstrated by shell metacharacters in the SMTPServerPort field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0356 | CVE-2019-8316 | D-Link DIR-878 Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetWebFilterSettings API function, as demonstrated by shell metacharacters in the WebFilterURLs field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0352 | CVE-2019-8312 | D-Link DIR-878 Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysLogSettings API function, as demonstrated by shell metacharacters in the IPAddress field. D-Link DIR-878 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0353 | CVE-2019-8313 | D-Link DIR-878 Command injection vulnerability in device firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv6FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv6AddressRangeStart field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201902-0357 | CVE-2019-8317 | D-Link DIR-878 Command injection vulnerability in device firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv6Settings API function, as demonstrated by shell metacharacters in the DestNetwork field. D-Link DIR-878 The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-878 is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in D-LinkDIR-878 using firmware version 1.12A1
| VAR-201903-1268 | CVE-2019-0729 | Azure IoT Java SDK Vulnerability in which privileges are elevated |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An Elevation of Privilege vulnerability exists in the way Azure IoT Java SDK generates symmetric keys for encryption, allowing an attacker to predict the randomness of the key, aka 'Azure IoT Java SDK Elevation of Privilege Vulnerability'. Attackers can use this vulnerability to predict the randomness of keys, obtain keys, and access users' IoT centers.
An attacker may exploit this issue to gain elevated privileges. Successful exploits may aid in further attacks
| VAR-201902-0717 | CVE-2019-0257 | SAP NetWeaver AS ABAP Platform Authorization vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Customizing functionality of SAP NetWeaver AS ABAP Platform (fixed in versions from 7.0 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.53, from 7.74 to 7.75) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. SAP NetWeaver AS ABAP Platform Contains an authorization vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SAP ABAP is prone to an authorization-bypass vulnerability.
Attackers can exploit this issue to gain unauthorized access and obtain sensitive information. This may aid in further attacks
| VAR-201902-0800 | CVE-2019-0112 | Intel Data Center Manager SDK Input validation vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Improper flow control in crypto routines for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Data Center Manager SDK Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
A local attacker can exploit this issue to crash the operating system, denying service to legitimate users. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0799 | CVE-2019-0111 | Intel Data Center Manager SDK Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.
A local attacker can exploit this issue to gain elevated privileges on an affected system. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0798 | CVE-2019-0110 | Intel Data Center Manager SDK Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Insufficient key management for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.
Local attackers can exploit this issue to obtain sensitive information. This may aid in further attacks. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0797 | CVE-2019-0109 | Intel Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper folder permissions in Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities.
An attackers may exploit this issue to gain elevated privileges.
Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0796 | CVE-2019-0108 | Intel Data Center Manager SDK Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable disclosure of information via local access.
A local attacker can exploit this issue to gain elevated privileges on an affected system. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0795 | CVE-2019-0107 | Intel Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Insufficient user prompt in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) Data Center Manager SDK Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities.
An attackers may exploit this issue to gain elevated privileges.
Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0794 | CVE-2019-0106 | Intel(R) Data Center Manager SDK Input validation vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Insufficient run protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) Data Center Manager SDK Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities.
An attackers may exploit this issue to gain elevated privileges.
Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment
| VAR-201902-0793 | CVE-2019-0105 | Intel(R) Data Center Manager SDK Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access. Intel Data Center Manager SDK is prone to multiple privilege-escalation vulnerabilities.
An attackers may exploit this issue to gain elevated privileges.
Intel Data Center Manager SDK version prior 5.0.2 are vulnerable. This product mainly provides real-time power supply and heat dissipation data of equipment. The vulnerability stems from insufficient checks of file permissions