VARIoT IoT vulnerabilities database
| VAR-201808-0155 | CVE-2017-16346 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c368 the value for the s_mac key is copied using strcpy to the buffer at 0xa000170c. This buffer is 25 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3". Insteon Hub The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0154 | CVE-2017-16345 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3". Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0153 | CVE-2017-16344 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c2c8 the value for the s_url key is copied using strcpy to the buffer at 0xa0001a0c. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3". Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0148 | CVE-2017-16339 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0152 | CVE-2017-16343 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c284 the value for the s_vol_brt_delta key is copied using strcpy to the buffer at 0xa0000510. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0151 | CVE-2017-16342 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c254 the value for the s_vol_dim_delta key is copied using strcpy to the buffer at 0xa0000514. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0149 | CVE-2017-16340 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c0e8 the value for the s_dport key is copied using strcpy to the buffer at 0xa000180c. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0147 | CVE-2017-16338 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bad0 the value for the host key is copied using strcpy to the buffer at 0xa00016e0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-1040 | CVE-2018-8032 | Apache Axis Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. Apache Axis is an open source, XML-based Web service architecture of the Apache Software Foundation in the United States. It includes SOAP servers implemented in Java and C++ languages, as well as various public services and APIs to generate and deploy Web services. application. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
| VAR-201808-0309 | CVE-2018-0408 | Cisco Small Business 300 Series Managed Switches Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87330. Vendors have confirmed this vulnerability Bug ID CSCvi87330 It is released as.Information may be obtained and information may be altered. The CiscoSmallBusiness300Series (Sx300) ManagedSwitches is a 300 series switch device from Cisco. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
| VAR-201808-0308 | CVE-2018-0407 | Cisco Small Business 300 Series Managed Switches Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Small Business 300 Series (Sx300) Managed Switches could allow an authenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvi87326. Vendors have confirmed this vulnerability Bug ID CSCvi87326 It is released as.Information may be obtained and information may be altered. The CiscoSmallBusiness300Series (Sx300) ManagedSwitches is a 300 series switch device from Cisco. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
| VAR-201808-0307 | CVE-2018-0406 | Cisco Web Security Appliance Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct a reflected or Document Object Model based (DOM-based) cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve84006. Vendors have confirmed this vulnerability Bug ID CSCve84006 It is released as.Information may be obtained and information may be altered. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
| VAR-201808-0299 | CVE-2018-0413 | Cisco Identity Services Engine Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvi85159. Vendors have confirmed this vulnerability Bug ID CSCvi85159 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Other attacks are also possible. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-201808-0296 | CVE-2018-0391 | Cisco Prime Collaboration Provisioning Authorization vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the password change function of Cisco Prime Collaboration Provisioning could allow an authenticated, remote attacker to cause the system to become inoperable. The vulnerability is due to insufficient validation of a password change request. An attacker could exploit this vulnerability by changing a specific administrator account password. A successful exploit could allow the attacker to cause the affected device to become inoperable, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 12.2 and prior. Cisco Bug IDs: CSCvd86586. Vendors have confirmed this vulnerability Bug ID CSCvd86586 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The software provides IP communications services functionality for IP telephony, voice mail, and unified communications environments
| VAR-201808-0972 | CVE-2018-5924 | HP Inkjet printer buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution. HP Inkjet printers contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple HP printers are prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.. Failed exploit attempts will result in denial-of-service conditions. HP Pagewide Pro, etc. are all printers from Hewlett-Packard (HP) in the United States. A stack-based buffer overflow vulnerability exists in many HP products. The vulnerability stems from the fact that the program does not correctly perform boundary detection on the data submitted by the user, causing the size of the copied data to exceed the buffer space. The following products are affected: HP Pagewide Pro; DesignJet; OfficeJet; DeskJet; Envy
| VAR-201808-0312 | CVE-2018-0411 | Cisco Unified Communications Manager Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvk15343. Vendors have confirmed this vulnerability Bug ID CSCvk15343 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201808-0971 | CVE-2018-5925 | HP Inkjet printer buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a static buffer overflow, which could allow remote code execution. HP Inkjet printers contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple HP printers are prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.. Failed exploit attempts will result in denial-of-service conditions. HP Pagewide Pro, etc. are all printers from Hewlett-Packard (HP) in the United States. A stack-based buffer overflow vulnerability exists in many HP products. The vulnerability stems from the fact that the program does not correctly perform boundary detection on the data submitted by the user, causing the size of the copied data to exceed the buffer space. The following products are affected: HP Pagewide Pro; DesignJet; OfficeJet; DeskJet; Envy
| VAR-201808-0928 | CVE-2018-3663 | Intel Saffron MemoryBase Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
Escalation of privilege in Intel Saffron MemoryBase before 11.4 allows an authenticated user access to privileged information. Intel Saffron MemoryBase is a memory base kit for Saffron developed by Intel Corporation. A security vulnerability exists in Intel Saffron MemoryBase prior to 11.4. An attacker could exploit this vulnerability to elevate privileges and gain access to sensitive information
| VAR-201808-0927 | CVE-2018-3662 | Intel Saffron MemoryBase Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Escalation of privilege in Intel Saffron MemoryBase before version 11.4 potentially allows an authorized user of the Saffron application to execute arbitrary code as root. Intel Saffron MemoryBase Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Saffron MemoryBase is a memory base kit for Saffron developed by Intel Corporation. A security vulnerability exists in Intel Saffron MemoryBase prior to 11.4
| VAR-201808-0926 | CVE-2018-3650 | INTEL Distribution for Python Input validation vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector. INTEL Distribution for Python Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Distribution for Python is a Python-based integrated software package from Intel Corporation of the United States. It is mainly used to accelerate computing-intensive applications and optimize performance using Intel's native performance library. Bleach module is one of the text cleaning modules. The vulnerability stems from the program's insufficient implementation of input validation. Attackers can exploit this vulnerability to bypass URL filtering