VARIoT IoT vulnerabilities database
| VAR-201801-1846 | No CVE | Command execution vulnerability in set_param program of pelco Sarix Pro network camera (CNVD-2017-36493) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A command execution vulnerability exists in the pelco Sarix Pro network camera set_param program. The vulnerability is because the program does not perform security checks on the parameters submitted by the user, allowing the attack to execute arbitrary system commands as root using shell metacharacters, thereby completely controlling the camera.
| VAR-201801-1832 | No CVE | Command execution vulnerability exists in pelco Sarix Pro network camera export.cgi program |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A command execution vulnerability exists in the pelco Sarix Pro network camera export.cgi program. The vulnerability is due to the program's failure to perform security checks on data when executing system commands, allowing attackers to use shell metacharacters to execute arbitrary system commands as root, thereby completely controlling the camera.
| VAR-201801-1835 | No CVE | XML entity injection vulnerability in pelco Sarix Pro webcam import.cgi |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
There is an XML entity injection vulnerability in the pelco Sarix Pro webcam import.cgi, which allows attackers to use the vulnerability to obtain sensitive information.
| VAR-201801-1820 | No CVE | Command execution vulnerability exists in pelco Sarix Pro network camera set_param program |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A command execution vulnerability exists in the pelco Sarix Pro network camera set_param program. The vulnerability is because the program does not perform security checks on the parameters submitted by the user, allowing the attack to execute arbitrary system commands as root using shell metacharacters, thereby completely controlling the camera.
| VAR-201801-1821 | No CVE | Login bypass bypass vulnerability in pelco Sarix Pro webcam WEB management interface |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
There is a login bypass vulnerability in the pelco Sarix Pro webcam WEB management interface. Allows an attacker to bypass password authentication and log in to the WEB management interface directly as an administrator.
| VAR-201801-1816 | No CVE | Weak password vulnerability in pelco Sarix Pro webcam WEB management interface |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A weak password vulnerability exists in the pelco Sarix Pro webcam WEB management interface. The attacker can obtain a hidden management account, use this account to perform any background operation, gain management authority, and completely control the camera.
| VAR-201801-1822 | No CVE | Command execution vulnerability in pelco Sarix Enhanced Dot1xSetupController.php file |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Enhanced is a webcam.
A command execution vulnerability exists in the pelco Sarix Enhanced Dot1xSetupController.php file. The vulnerability is due to the program's failure to properly perform validity checks when processing user-submitted data, allowing attackers who have passed web authentication to use shell metacharacters to bypass restrictions and execute arbitrary commands as root.
| VAR-201801-1825 | No CVE | Command execution vulnerability in set_param program of pelco Sarix Pro network camera (CNVD-2017-36494) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A command execution vulnerability exists in the pelco Sarix Pro network camera set_param program. The vulnerability is because the program does not perform security checks on the parameters submitted by the user, allowing the attack to execute arbitrary system commands as root using shell metacharacters, thereby completely controlling the camera.
| VAR-201801-1826 | No CVE | Code Execution Vulnerability in pelco Sarix Pro Network Camera session.cgi Program |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A code execution vulnerability exists in the pelco Sarix Pro webcam session.cgi program. The vulnerability is because the program does not check the length when processing user submitted data. A remote attacker could use the vulnerability to execute arbitrary code, resulting in a stack overflow.
| VAR-201801-1829 | No CVE | Arbitrary file deletion vulnerability in pelco Sarix Pro webcam set_param program |
CVSS V2: 4.8 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
There is an arbitrary file deletion vulnerability in the pelco Sarix Pro webcam set_param program. The vulnerability is because the program does not check the file name when processing parameters. An attacker can use the vulnerability to delete any file or directory, causing the camera to fail to work properly.
| VAR-201801-1833 | No CVE | Information Disclosure Vulnerability in Pelco Sarix Pro Network Camera |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
An information disclosure vulnerability exists in the pelco Sarix Pro network camera. Allows attackers to exploit vulnerabilities to obtain sensitive information.
| VAR-201801-1834 | No CVE | Command execution vulnerability in set_param program of pelco Sarix Pro network camera (CNVD-2017-36490) |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
pelco Sarix Professional is a video camera.
A command execution vulnerability exists in the pelco Sarix Pro network camera set_param program. The vulnerability is due to the program's failure to perform security checks on the parameters submitted by the user, allowing attackers to use shell metacharacters to execute arbitrary system commands as root to completely control the camera.
| VAR-201801-1459 | CVE-2018-5281 | SonicWall SonicOS Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens. SonicWall SonicOS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Dell SonicWall SonicOS NSA is prone to multiple HTML-Injection vulnerabilities .
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
All versions of Dell SonicWall SonicOS are vulnerable. SonicWall SonicOS is a system that runs on it. A remote attacker could exploit this vulnerability to bypass throttling mechanisms or filter protections
| VAR-201801-1458 | CVE-2018-5280 | SonicWall SonicOS Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens. SonicWall SonicOS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Dell SonicWall SonicOS NSA is prone to HTML-Injection vulnerability.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. SonicWall SonicOS is a system that runs on it. A remote attacker could exploit this vulnerability to inject malicious code
| VAR-201801-0094 | CVE-2014-10069 | Hitron CVE-30360 Cryptographic vulnerabilities in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field. Hitron CVE-30360 The device contains cryptographic vulnerabilities.Information may be obtained. HitronCVE-30360devices is a router device from China Hitron. A security vulnerability exists in the HitronCVE-30360 device that originated from the shared 578A958E3DD933FCDES key used by the program
| VAR-201801-1869 | No CVE | Advantech WebAccess webvrpcs drawsrv Arbitrary Free Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x2721 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to using it as a memory address in a free operation. An attacker can leverage this functionality to execute code under the context of Administrator.
| VAR-201801-0152 | CVE-2017-16728 | Advantech WebAccess webvrpcs drawsrv Untrusted Pointer Dereference Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: MEDIUM |
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x27f1 IOCTL in the webvrpcs process. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A denial of service vulnerability exists in versions prior to Advantech WebAccess 8.3
| VAR-201801-0151 | CVE-2017-16724 | Advantech WebAccess Buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 9.8 Severity: HIGH |
A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the parsing of the command line in the BwNodeIP utility. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment
| VAR-201801-1868 | No CVE | Advantech WebAccess picfile File Upload Remote Code Execution Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the picfile parameter in gmicons.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of any file. An attacker can leverage this vulnerability to execute code in the context of the the web service.
| VAR-201801-1023 | CVE-2017-1534 | IBM Security Access Manager Appliance open redirect vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
IBM Security Access Manager Appliance 8.0.0 and 9.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 130676. Vendors have confirmed this vulnerability IBM X-Force ID: 130676 It is released as.Information may be obtained and information may be altered.
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible. The product enables access management control through integrated appliances for web, mobile and cloud computing