VARIoT IoT vulnerabilities database
| VAR-201703-1430 | No CVE | SAP NetWeaver Unspecified Security Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP NetWeaver is prone to an unspecified security-bypass vulnerability.
Remote attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions.
| VAR-201703-1425 | No CVE | SAP Enterprise Portal 'styleservice' Cross Site Scripting Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP Enterprise Portal is prone to an unspecified cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
| VAR-201703-1427 | No CVE | SAP NetWeaver Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP NetWeaver is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
| VAR-201703-0607 | CVE-2017-0095 | Microsoft Windows 10 and Windows Server 2016 of Hyper-V Vulnerable to arbitrary code execution |
CVSS V2: 7.9 CVSS V3: 7.6 Severity: HIGH |
Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021. According to Microsoft security bulletins, this vulnerability Hyper-V vSMB As a remote code execution vulnerability. Microsoft Windows is a series of operating systems from Microsoft Corporation. Hyper-V is one of these virtualization products. Failed exploit attempts will result in a denial-of-service condition
| VAR-201703-1419 | No CVE | SAP ERP Remote Authorization Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP ERP is prone to an authorization-bypass vulnerability.
Attackers can exploit this issue to gain unauthorized access and obtain sensitive information. This may aid in further attacks.
| VAR-201703-1418 | No CVE | SAP ERP Remote Authorization Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP ERP is prone to an authorization-bypass vulnerability.
Attackers can exploit this issue to gain unauthorized access and obtain sensitive information. This may aid in further attacks.
| VAR-201703-1407 | No CVE | SAP NetWeaver Monitoring Application Unspecified Cross Site Scripting Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP NetWeaver is prone to an unspecified cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
| VAR-201703-1406 | No CVE | SAP Enterprise Portal 'GenericSemanticTest' Component Cross Site Scripting Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP Enterprise Portal is prone to an unspecified cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
| VAR-201703-1405 | No CVE | SAP NetWeaver Log Viewer Security Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP NetWeaver is prone to a security-bypass vulnerability.
Remote attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions.
| VAR-201709-1173 | CVE-2017-6794 | Cisco Meeting Server Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the CLI command-parsing code of Cisco Meeting Server could allow an authenticated, local attacker to perform command injection and escalate their privileges to root. The attacker must first authenticate to the application with valid administrator credentials. The vulnerability is due to insufficient validation of user-supplied input at the CLI for certain commands. An attacker could exploit this vulnerability by authenticating to the affected application and submitting a crafted CLI command for execution at the Cisco Meeting Server CLI. An exploit could allow the attacker to perform command injection and escalate their privilege level to root. Vulnerable Products: This vulnerability exists in Cisco Meeting Server software versions prior to and including 2.0, 2.1, and 2.2. Cisco Bug IDs: CSCvf53830. Vendors have confirmed this vulnerability Bug ID CSCvf53830 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201709-1174 | CVE-2017-6795 | Cisco IOS XE Input validation vulnerability |
CVSS V2: 4.7 CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability in the USB-modem code of Cisco IOS XE Software running on Cisco ASR 920 Series Aggregation Services Routers could allow an authenticated, local attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the platform usb modem command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the platform usb modem command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device. Cisco Bug IDs: CSCvf10783. Cisco IOS XE Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug IDs: CSCvf10783 It is released as.Information may be tampered with. The Cisco ASR920 Series Aggregation Services Routers is the ASR920 series of multi-function routers from Cisco. Cisco IOSXESoftware is one of the operating systems dedicated to network devices. A security vulnerability exists in IOSXESoftware's USB-modem code in Cisco ASR920 Series AggregationServicesRouters, which stems from a program failing to validate input
| VAR-201703-1382 | No CVE | DBLTek GoIP 'dbladm' User Unauthorized Access Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
DBLTechnology is a manufacturer of communication equipment in Shenzhen. Its main products include GSM voice gateway, IP telephony gateway, enterprise-class softswitch, etc., which are mostly used by telephone companies and VoIP service providers. The DBLTekGoIP 'dbladm' user has an unauthorized access vulnerability. The attacker obtains sensitive information about the device by logging in \"ctlcmd\" and \"limitsh\" and accessing it with the user-configured administrator password, and obtaining a shell with root privileges on the affected device.
| VAR-201703-1090 | CVE-2017-6398 | Trend Micro InterScan Messaging Security (Virtual Appliance) Terminal command execution vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.
An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition
| VAR-201706-0515 | CVE-2017-4901 | VMware Workstation and Fusion of drag-and-drop Memory out-of-bounds access vulnerability |
CVSS V2: 7.5 CVSS V3: 9.9 Severity: CRITICAL |
The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion. VMwareWorkstation and others are virtual machine software products of the US company. VMwareWorkstation is a set of expensive and feature-rich virtual machine software. VMwareWorkstationPlayer is a set of free, open source and simpler virtual machine software. VMWareFusion allows seamless running of Windows applications on Intel-based Mac machines. A memory corruption vulnerability exists in multiple VMware products. An attacker could exploit this vulnerability to execute arbitrary code in the context of a user running in an affected program, which would result in a denial of service. Failed exploit attempts will likely result in denial-of-service conditions.
The following products are vulnerable:
VMware Workstation Pro 12.x
VMware Workstation Player 12.x
VMware Fusion Pro 8.x
VMware Fusion 8.x
| VAR-201707-1240 | CVE-2017-9845 | SAP NetWeaver of disp+work Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
disp+work 7400.12.21.30308 in SAP NetWeaver 7.40 allows remote attackers to cause a denial of service (resource consumption) via a crafted DIAG request, aka SAP Security Note 2405918. SAP Netweaver is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause denial-of-service conditions
| VAR-201709-1175 | CVE-2017-6796 | Cisco ASR 920 Operates on the Series Aggregation Service Router Cisco IOS XE In OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the USB-modem code of Cisco IOS XE Software running on Cisco ASR 920 Series Aggregation Services Routers could allow an authenticated, local attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the platform usb modem command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the platform usb modem command in the CLI of an affected device. A successful exploit could allow the attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. Cisco Bug IDs: CSCve48949. Vendors have confirmed this vulnerability Bug ID CSCve48949 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco ASR920 Series Aggregation Services Routers is the ASR920 series of multi-function routers from Cisco. Cisco IOSXESoftware is one of the operating systems dedicated to network devices. The IOSXESoftware USB-modem code in Cisco ASR920 Series AggregationServicesRouters has an arbitrary command execution vulnerability that stems from a program failing to perform input validation correctly. Failed attempts may lead to denial-of-service conditions
| VAR-201707-1239 | CVE-2017-9844 | SAP NetWeaver Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.5 CVSS V3: 7.5 Severity: HIGH |
SAP NetWeaver 7400.12.21.30308 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted serialized Java object in a request to metadatauploader, aka SAP Security Note 2399804. NOTE: The vendor states that the devserver package of Visual Composer deserializes a malicious object that may cause legitimate users accessing a service, either by crashing or flooding the service. SAP NetWeaver is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause a denial-of-service condition
| VAR-201703-0181 | CVE-2016-8005 | Intel Security McAfee Email Gateway Vulnerable to file extension filtering |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
File extension filtering vulnerability in Intel Security McAfee Email Gateway (MEG) before 7.6.404h1128596 allows attackers to fail to identify the file name properly via scanning an email with a forged attached filename that uses a null byte within the filename extension. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. There is a security vulnerability in versions earlier than Intel Security MEG 7.6.404h1128596. The vulnerability is caused by the program not recognizing the file name correctly. An attacker could exploit this vulnerability by scanning email to bypass application protection
| VAR-201703-1354 | CVE-2017-6896 |
DIGISOL DG-HR1400 Elevated privilege vulnerability in wireless router
Related entries in the VARIoT exploits database: VAR-E-201703-0271 |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Privilege escalation vulnerability on the DIGISOL DG-HR1400 1.00.02 wireless router enables an attacker to escalate from user privilege to admin privilege just by modifying the Base64-encoded session cookie value. The DIGISOLDG-HR1400 is a wireless router. There is an elevation of privilege vulnerability in DIGISOLDG-HR1400. DIGISOL DG-HR1400 is a wireless broadband home router produced by DIGISOL SYSTEMS in India
| VAR-201703-0379 | CVE-2015-4407 | Hikvision NVR DS-76xxNI-E1/2 and DS-77xxxNI-E4 Device buffer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Buffer overflow on Hikvision NVR DS-76xxNI-E1/2 and DS-77xxxNI-E4 devices before 3.4.0 allows remote authenticated users to cause a denial of service (service interruption) via a crafted HTTP request, aka the PSIA issue. Hikvision NVR DS-76xxNI-E1/2 and DS-77xxxNI-E4 The device contains a buffer overflow vulnerability. Hikvision NVRDS-76xxNI-E1/2 and DS-77xxxNI-E4 are HDKvision's hard disk recorders. Hikvision NVR DS-77xxxNI-E4 etc. The following products and versions are affected: Hikvision NVR DS-77xxxNI-E4, DS-76xxNI-E1 and DS-76xxNI-E2 versions prior to 3.4.0