VARIoT IoT vulnerabilities database
| VAR-201608-0491 | No CVE | CIMCO DSS-MAX Decision Support System Has SQL Injection Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
CIMCO is the DNC system with the largest installed capacity in the world. It is mainly used for network communication and machine tool monitoring of CNC machine tools. CIMCO DSS-Max Server is DNC / MDC decision support service software, through which the DNC / MDC database can be easily managed.
The CIMCO DSS-MAX decision support system has a SQL injection vulnerability. Because the DSS-Max system information query page is not strictly filtered, it allows attackers to launch SQL injection attacks using GET requests.
| VAR-201608-0442 | No CVE | Huawei eSpace IAD Remote Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Both Huawei eSpace IAD TS0802 and TS0801 are integrated access devices for IP voice and unified communications solutions from China's Huawei.
A remote information disclosure vulnerability exists in Huawei eSpace IAD. A remote attacker could use this vulnerability to obtain sensitive information
| VAR-201608-0149 | CVE-2016-3848 | Nexus 9 Run on device Android of NVIDIA Vulnerability gained in media driver |
CVSS V2: 7.6 CVSS V3: 7.0 Severity: HIGH |
The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28919417. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege-escalation vulnerabilities.
Attackers can exploit these issues gain elevated privileges.
These issues are being tracked by Android Bug ID A-28871433 and A-28919417
| VAR-201608-0378 | CVE-2014-9872 | Nexus 5 Run on device Android of Qualcomm Component diag Driver vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The diag driver in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not ensure unique identifiers in a DCI client table, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28750155 and Qualcomm internal bug CR590721. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0373 | CVE-2014-9867 | Nexus 5 and 7 (2013) Run on device Android of Qualcomm Vulnerability gained privileges in components |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
drivers/media/platform/msm/camera_v2/isp/msm_isp_axi_util.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not validate the number of streams, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28749629 and Qualcomm internal bug CR514702. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Androidbefore2016-08-05onNexus5 and 7devices have privilege escalation vulnerabilities that allow an attacker to gain access to a well-crafted application. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0153 | CVE-2016-3852 | Android One Run on device Android of MediaTek Wi-Fi Vulnerabilities in which important information is obtained in drivers |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
The MediaTek Wi-Fi driver in Android before 2016-08-05 on Android One devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 29141147 and MediaTek internal bug ALPS02751738. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a vulnerability disclosure that could allow an attacker to obtain sensitive information that could help launch further attacks. Google Nexus is prone to an information-disclosure vulnerability.
This issue is being tracked by Android Bug ID A-29141147*
| VAR-201608-0407 | CVE-2014-9901 | Nexus 7 (2013) Run on device Android of Qualcomm Wi-Fi Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The Qualcomm Wi-Fi driver in Android before 2016-08-05 on Nexus 7 (2013) devices makes incorrect snprintf calls, which allows remote attackers to cause a denial of service (device hang or reboot) via crafted frames, aka Android internal bug 28670333 and Qualcomm internal bug CR548711. Vendors have confirmed this vulnerability Android internal bug 28670333 and Qualcomm internal bug CR548711 It is released as. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlService disruption through a specially crafted frame by a third party ( Device hang or reboot ) There is a possibility of being put into a state. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. A denial of service vulnerability exists in GoogleNexus that could be exploited by a remote attacker to cause a denial of service. Google Nexus is prone to denial-of-service vulnerability.
This issue is being tracked by Android Bug ID A-28670333
| VAR-201608-0172 | CVE-2016-3843 | Android Vulnerability gained in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Android before 2016-08-05 does not properly restrict code execution in a kernel context, which allows attackers to gain privileges via a crafted application, as demonstrated by the kernel performance subsystem and the Qualcomm performance component, aka Android internal bugs 28086229 and 29119870 and Qualcomm internal bug CR1011071. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a privilege elevation vulnerability that could allow an attacker to execute arbitrary code using elevated kernel-wide permissions. Google Android is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to gain elevated privileges within the context of the affected application.
These issues are being tracked by Android Bug IDs A-29119870 and A-28086229
| VAR-201608-0370 | CVE-2014-9864 | Nexus 5 and 7 (2013) Runs on the device Android of Qualcomm Component drivers/misc/qseecom.c Vulnerability gained in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not validate ioctl calls, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28747998 and Qualcomm internal bug CR561841. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Androidbefore2016-08-05onNexus5 and 7devices have privilege escalation vulnerabilities that allow an attacker to gain access to a well-crafted application. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0154 | CVE-2016-3853 | Nexus Run on device Android of Google Play In service Factory Reset Protection Vulnerabilities that circumvent protection mechanisms |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
Google Play services in Android before 2016-08-05 on Nexus devices allow local users to bypass the Factory Reset Protection protection mechanism and delete data via unspecified vectors, aka internal bug 26803208. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a privilege elevation vulnerability that could allow an attacker to escalate permissions and execute arbitrary code within the scope of the kernel. Google Nexus is prone to a privilege-escalation vulnerability.
Attackers can exploit this issue to gain elevated privileges.
This issue is being tracked by Android Bug ID A-26803208*
| VAR-201608-0173 | CVE-2016-3844 | Nexus 9 and Pixel C Run on device Android Vulnerability that can be obtained authority in the media server of |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
mediaserver in Android before 2016-08-05 on Nexus 9 and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 28299517. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a privilege elevation vulnerability that could allow an attacker to execute arbitrary code using elevated kernel-wide permissions. Google Nexus is prone to a privilege-escalation vulnerability.
Google Nexus 9, and Pixel C are vulnerable.
This issue is being tracked by Android Bug ID A-28299517
| VAR-201608-0381 | CVE-2014-9875 | Nexus 7 (2013) Run on device Android of Qualcomm Component drivers/char/diag/diag_dci.c Vulnerability gained in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
drivers/char/diag/diag_dci.c in the Qualcomm components in Android before 2016-08-05 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application that sends short DCI request packets, aka Android internal bug 28767589 and Qualcomm internal bug CR483310. Nexus 7 (2013) Run on device Android of Qualcomm Component drivers/char/diag/diag_dci.c Contains a privileged vulnerability. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0380 | CVE-2014-9874 | plural Nexus Run on device Android of Qualcomm Component buffer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Buffer overflow in the Qualcomm components in Android before 2016-08-05 on Nexus 5, 5X, 6P, and 7 (2013) devices allows attackers to gain privileges via a crafted application, related to arch/arm/mach-msm/qdsp6v2/audio_utils.c and sound/soc/msm/qdsp6v2/q6asm.c, aka Android internal bug 28751152 and Qualcomm internal bug CR563086. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0379 | CVE-2014-9873 | Nexus 5 and 7 (2013) Run on device Android of Qualcomm Component integer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Integer underflow in drivers/char/diag/diag_dci.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges or obtain sensitive information via a crafted application, aka Android internal bug 28750726 and Qualcomm internal bug CR556860. Nexus 5 and 7 (2013) Run on device Android of Qualcomm Component drivers/char/diag/diag_dci.c Contains an integer overflow vulnerability. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0163 | CVE-2016-3834 | Android Camera API Vulnerable to access restrictions |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
The camera APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allow attackers to bypass intended access restrictions and obtain sensitive information about ANW buffer addresses via a crafted application, aka internal bug 28466701. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a vulnerability in local information disclosure that could allow an attacker to obtain sensitive information that could help launch further attacks. Google Nexus is prone to a local information-disclosure vulnerability.
This issue is being tracked by Android Bug ID A-A-28466701
| VAR-201608-0369 | CVE-2014-9863 | Nexus 5 and 7 (2013) Runs on the device Android of Qualcomm Component diag Driver integer underflow vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Integer underflow in the diag driver in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges or obtain sensitive information via a crafted application, aka Android internal bug 28768146 and Qualcomm internal bug CR549470. Vendors have confirmed this vulnerability Android internal bug 28768146 and Qualcomm internal bug CR549470 It is released as. Supplementary information : CWE Vulnerability type by CWE-190: Integer Overflow or Wraparound ( Integer overflow or wraparound ) Has been identified. http://cwe.mitre.org/data/definitions/190.htmlAn attacker could gain privileges or gain important information through a crafted application. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel
| VAR-201608-0377 | CVE-2014-9871 | Nexus 5 and 7 (2013) Run on device Android of Qualcomm Component buffer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Multiple buffer overflows in drivers/media/platform/msm/camera_v2/isp/msm_isp_util.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka Android internal bug 28749803 and Qualcomm internal bug CR514717. Nexus 5 and 7 (2013) Run on device Android of Qualcomm Component drivers/media/platform/msm/camera_v2/isp/msm_isp_util.c Contains a buffer overflow vulnerability. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207
| VAR-201608-0151 | CVE-2016-3850 | plural Nexus Runs on the device Android of Qualcomm Boot loader app/aboot/aboot.c Integer overflow vulnerability |
CVSS V2: 6.9 CVSS V3: 7.3 Severity: HIGH |
Integer overflow in app/aboot/aboot.c in the Qualcomm bootloader in Android before 2016-08-05 on Nexus 5, 5X, 6P, and 7 (2013) devices allows attackers to gain privileges via a crafted header field in a boot image, aka Android internal bug 27917291 and Qualcomm internal bug CR945164. GoogleNexus is a high-end mobile phone series powered by Google\342\200\231s original Android system. GoogleNexus has a privilege elevation vulnerability that could allow an attacker to execute arbitrary code using elevated kernel-wide permissions. Google Nexus is prone to a privilege-escalation vulnerability.
This issue is being tracked by Android Bug ID A-27917291
| VAR-201608-0371 | CVE-2014-9865 | Nexus 5 and 7 (2013) Runs on the device Android of Qualcomm Component drivers/misc/qseecom.c Vulnerability gained in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not properly restrict user-space input, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28748271 and Qualcomm internal bug CR550013. Vendors have confirmed this vulnerability Android internal bug 28748271 and Qualcomm internal bug CR550013 It is released as. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlAn attacker could gain privileges through a crafted application. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel
| VAR-201608-0372 | CVE-2014-9866 | Nexus 5 and 7 (2013) Runs on device Android of Qualcomm Vulnerability in component acquisition |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not validate a certain parameter, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28747684 and Qualcomm internal bug CR511358. AndroidonNexus is a high-end mobile phone series powered by Google's original Android system. Androidbefore2016-08-05onNexus5 and 7devices have privilege escalation vulnerabilities that allow an attacker to gain access to a well-crafted application. Google Nexus is prone to multiple privilege escalation vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges within the context of the kernel.
These issues are being tracked by Android Bug IDs A-28768146, A-28747998, A-28748271, A-28747684, A-28749629, A-28749721, A-28749728, A-28749743, A-28749803, A-28750155, A-28750726, A-28751152, A-28767589, A-28767796, A-28768281, A-28769208, A-28769221, A-28769352, A-28769368, A-28769546, A-28769912, A-28769920, A-28769959, A-28815575, A-28804057, A-28803642, A-28803645, A-28803962, A-28804030, A-28398884, A-28813987, A-28814502, A-28814652, A-28815158, A-28749283, and A-28770207