VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201806-0502 CVE-2017-16181 wintiwebdev Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
wintiwebdev is a static file server. wintiwebdev is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wintiwebdev Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in wintiwebdev
VAR-201806-0512 CVE-2017-16191 cypserver Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
cypserver is a static file server. cypserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. cypserver Contains a path traversal vulnerability.Information may be obtained. Cypserver has a directory traversal vulnerability
VAR-201806-0506 CVE-2017-16185 uekw1511server Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
uekw1511server is a static file server. uekw1511server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. uekw1511server Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in uekw1511server
VAR-201806-0490 CVE-2017-16169 looppake Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
looppake is a simple http server. looppake is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. looppake Contains a path traversal vulnerability.Information may be obtained. Looppake has a directory traversal vulnerability
VAR-201806-0495 CVE-2017-16174 whispercast Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
whispercast is a file server. whispercast is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. whispercast Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in whispercast
VAR-201806-0497 CVE-2017-16176 jansenstuffpleasework Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
jansenstuffpleasework is a file server. jansenstuffpleasework is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. jansenstuffpleasework Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in jansenstuffpleasework
VAR-201806-0465 CVE-2017-16143 commentapp.stetsonwood Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
commentapp.stetsonwood is an http server. commentapp.stetsonwood is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. commentapp.stetsonwood Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in commentapp.stetsonwood
VAR-201806-1520 CVE-2018-3713 Angular-http-server path traversal vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
angular-http-server node module suffers from a Path Traversal vulnerability due to lack of validation of possibleFilename, which allows a malicious user to read content of any file with known path. Angular-http-server is an HTTP server for deploying single-page applications. There is a path traversal vulnerability in angular-http-server. The vulnerability stems from the lack of verification of possibleFilename by the program
VAR-201806-0491 CVE-2017-16170 liuyaserver Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
liuyaserver is a static file server. liuyaserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. liuyaserver Contains a path traversal vulnerability.Information may be obtained. Liuyaserver has a directory traversal vulnerability
VAR-201806-0481 CVE-2017-16160 11xiaoli Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
11xiaoli is a simple file server. 11xiaoli is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 11xiaoli Contains a path traversal vulnerability.Information may be obtained. 11xiaoli has a directory traversal vulnerability
VAR-201806-1523 CVE-2018-3716 Simplehttpserver cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
simplehttpserver node module suffers from a Cross-Site Scripting vulnerability to a lack of validation of file names. Simplehttpserver is an HTTP file server. An attacker could exploit this vulnerability to inject arbitrary web scripts or HTML
VAR-201806-0456 CVE-2017-16134 http_static_simple Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
http_static_simple is an http server. http_static_simple is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. http_static_simple Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in http_static_simple
VAR-201806-0501 CVE-2017-16180 serverabc Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
serverabc is a static file server. serverabc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverabc Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverabc
VAR-201806-0500 CVE-2017-16179 dasafio Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
dasafio is a web server. dasafio is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. File access is restricted to only .html files. dasafio Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in desafio
VAR-201806-0492 CVE-2017-16171 hcbserver Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
hcbserver is a static file server. hcbserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. hcbserver Contains a path traversal vulnerability.Information may be obtained. Hcbserver has a directory traversal vulnerability
VAR-201806-1519 CVE-2018-3712 Serve path traversal vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
serve node module before 6.4.9 suffers from a Path Traversal vulnerability due to not handling %2e (.) and %2f (/) and allowing them in paths, which allows a malicious user to view the contents of any directory with known path. serve node The module contains a path traversal vulnerability.Information may be obtained. Serve is a static file server that is primarily used to deploy local single-page applications or static files. A path traversal vulnerability exists in versions prior to serve6.4.9 that caused the program to fail to adequately filter the %2e(.) and %2f(/) characters in the url
VAR-201806-1525 CVE-2018-3718 serve node Module data processing vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded. serve node The module contains a data processing vulnerability.Information may be obtained. Serve is an HTTP server for deploying single-page applications. An attacker could exploit the vulnerability to reveal information using a directory listing
VAR-201807-1814 CVE-2018-5885 Snapdragon Mobile and Snapdragon Wear Buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
While loading dynamic fonts, a buffer overflow may occur if the number of segments in the font file is out of range in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm Snapdragon Mobile and Snapdragon Wear are both Qualcomm's central processing unit (CPU) products for different platforms. Secure UI is one of the security management interfaces. An attacker could exploit this vulnerability to cause a denial of service or execute arbitrary code
VAR-201807-1821 CVE-2018-5892 Snapdragon Mobile and Snapdragon Wear Vulnerabilities in environment settings CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The Touch Pal application can collect user behavior data without awareness by the user in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510
VAR-201806-1026 CVE-2018-0296 Cisco Adaptive Security Appliance and Firepower Threat Defense Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. Vendors have confirmed this vulnerability Bug ID CSCvi16029 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ASASoftware and FirepowerThreatDefense (FTD) Software are operating systems that run on different devices