VARIoT IoT vulnerabilities database
| VAR-201806-0465 | CVE-2017-16143 | commentapp.stetsonwood Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
commentapp.stetsonwood is an http server. commentapp.stetsonwood is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. commentapp.stetsonwood Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in commentapp.stetsonwood
| VAR-201806-1520 | CVE-2018-3713 | Angular-http-server path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
angular-http-server node module suffers from a Path Traversal vulnerability due to lack of validation of possibleFilename, which allows a malicious user to read content of any file with known path. Angular-http-server is an HTTP server for deploying single-page applications. There is a path traversal vulnerability in angular-http-server. The vulnerability stems from the lack of verification of possibleFilename by the program
| VAR-201806-0491 | CVE-2017-16170 | liuyaserver Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
liuyaserver is a static file server. liuyaserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. liuyaserver Contains a path traversal vulnerability.Information may be obtained. Liuyaserver has a directory traversal vulnerability
| VAR-201806-0481 | CVE-2017-16160 | 11xiaoli Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
11xiaoli is a simple file server. 11xiaoli is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 11xiaoli Contains a path traversal vulnerability.Information may be obtained. 11xiaoli has a directory traversal vulnerability
| VAR-201806-1523 | CVE-2018-3716 | Simplehttpserver cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
simplehttpserver node module suffers from a Cross-Site Scripting vulnerability to a lack of validation of file names. Simplehttpserver is an HTTP file server. An attacker could exploit this vulnerability to inject arbitrary web scripts or HTML
| VAR-201806-0456 | CVE-2017-16134 | http_static_simple Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
http_static_simple is an http server. http_static_simple is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. http_static_simple Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in http_static_simple
| VAR-201806-0501 | CVE-2017-16180 | serverabc Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
serverabc is a static file server. serverabc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverabc Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverabc
| VAR-201806-0500 | CVE-2017-16179 | dasafio Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
dasafio is a web server. dasafio is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. File access is restricted to only .html files. dasafio Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in desafio
| VAR-201806-0492 | CVE-2017-16171 | hcbserver Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
hcbserver is a static file server. hcbserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. hcbserver Contains a path traversal vulnerability.Information may be obtained. Hcbserver has a directory traversal vulnerability
| VAR-201806-1519 | CVE-2018-3712 | Serve path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
serve node module before 6.4.9 suffers from a Path Traversal vulnerability due to not handling %2e (.) and %2f (/) and allowing them in paths, which allows a malicious user to view the contents of any directory with known path. serve node The module contains a path traversal vulnerability.Information may be obtained. Serve is a static file server that is primarily used to deploy local single-page applications or static files. A path traversal vulnerability exists in versions prior to serve6.4.9 that caused the program to fail to adequately filter the %2e(.) and %2f(/) characters in the url
| VAR-201806-1525 | CVE-2018-3718 | serve node Module data processing vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded. serve node The module contains a data processing vulnerability.Information may be obtained. Serve is an HTTP server for deploying single-page applications. An attacker could exploit the vulnerability to reveal information using a directory listing
| VAR-201807-1814 | CVE-2018-5885 | Snapdragon Mobile and Snapdragon Wear Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
While loading dynamic fonts, a buffer overflow may occur if the number of segments in the font file is out of range in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm Snapdragon Mobile and Snapdragon Wear are both Qualcomm's central processing unit (CPU) products for different platforms. Secure UI is one of the security management interfaces. An attacker could exploit this vulnerability to cause a denial of service or execute arbitrary code
| VAR-201807-1821 | CVE-2018-5892 | Snapdragon Mobile and Snapdragon Wear Vulnerabilities in environment settings |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Touch Pal application can collect user behavior data without awareness by the user in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510
| VAR-201806-1026 | CVE-2018-0296 | Cisco Adaptive Security Appliance and Firepower Threat Defense Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. Vendors have confirmed this vulnerability Bug ID CSCvi16029 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ASASoftware and FirepowerThreatDefense (FTD) Software are operating systems that run on different devices
| VAR-201806-0487 | CVE-2017-16166 | byucslabsix Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
byucslabsix is an http server. byucslabsix is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. byucslabsix Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in byucslabsix
| VAR-201905-0692 | CVE-2017-18157 | plural Snapdragon Vulnerability in using freed memory in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A Use After Free Condition can occur in Thermal Engine in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in the Thermal Engine in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
| VAR-201905-0697 | CVE-2017-18156 | plural Snapdragon Vulnerability in using freed memory in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
While processing camera buffers in camera driver, a use after free condition can occur in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 625, SD 820, SD 820A, SD 835, SDX20. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in the Connected Camera in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions (for automotive, mobile, and wearables) are affected: Qualcomm MDM9206; MDM9607; MDM9650; MSM8996AU; SD 210; SD 212; SD 205; SD 625; SD 820; SD 820A;
| VAR-201807-1845 | CVE-2018-5884 | Snapdragon Mobile and Snapdragon Wear Access control vulnerability |
CVSS V2: 4.6 CVSS V3: 8.4 Severity: HIGH |
Improper Access Control in Multimedia in Snapdragon Mobile and Snapdragon Wear, Non-standard applications without permission may acquire permission of Qualcomm-specific proprietary intents. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm Snapdragon Mobile and Snapdragon Wear are both Qualcomm's central processing unit (CPU) products for different platforms. Multimedia is one of the multimedia components
| VAR-201807-1820 | CVE-2018-5891 | Snapdragon Mobile and Snapdragon Wear Vulnerabilities in use of freed memory |
CVSS V2: 4.6 CVSS V3: 8.4 Severity: HIGH |
While processing modem SSR after IMS is registered, the IMS data daemon is restarted but the ipc_dataHandle is no longer available. Consequently, the DPL thread frees the internal memory for dataDHandle but the local variable pointer is not updated which can lead to a Use After Free condition in Snapdragon Mobile and Snapdragon Wear. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities.
An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks.
These issues are being tracked by Android Bug IDs A-73539080, A-73539065, A-72951191, A-72950815, A-72950554, A-74236854, and A-74235510. Qualcomm MSM8996AU is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in Data Network Stack & Connectivity in several Qualcomm products. A local attacker could exploit this vulnerability with a specially crafted file to cause a system crash (denial of service). The following products and versions are affected: Qualcomm MSM8909W; MSM8996AU; SD 210; SD 212; SD 205; SD 450; SD 615/16; SD 415; SD 625; SD 650/52;
| VAR-201806-1521 | CVE-2018-3714 | Node-srv path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path. node-srv node The module contains a path traversal vulnerability.Information may be obtained. Node-srv is a static Node.js server that supports Heroku and Grunt.js