VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201502-0541 No CVE Cross-site Scripting Vulnerability in JP1/IT Desktop Management - Manager and Hitachi IT Operations Director CVSS V2: 4.3
CVSS V3: -
Severity: Medium
A cross-site scripting vulnerability was found in the online help of JP1/IT Desktop Management - Manager and Hitachi IT Operations Director. Remote users can exploit a cross-site scripting vulnerability to execute malicious scripts.
VAR-201502-0334 CVE-2014-2188 ** Delete ** Cisco IOS of Authentication Proxy Vulnerabilities that bypass authentication in functions CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-0607. Reason: This candidate is a duplicate of CVE-2015-0607. The wrong ID was used. Notes: All CVE users should reference CVE-2015-0607 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. ** Delete ** This case CVE-2015-0607 It was removed because it was found to be duplicated. CVE-2015-0607 Please refer to. Cisco IOS of Authentication Proxy The function is RADIUS and TACACS+ Invalid from server AAA There is a vulnerability that bypasses authentication due to improper handling of return codes. Vendors have confirmed this vulnerability Bug ID CSCuo09400 and CSCun16016 It is released as.A third party may be able to bypass authentication through connection attempts that trigger invalid code. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS Software is prone to an authentication-bypass vulnerability. This may lead to further attacks. This issue is tracked by Cisco Bug IDs CSCuo09400 and CSCun16016
VAR-201502-0509 No CVE Multiple vulnerabilities in multiple D-Link and TRENDnet routers 'ncc/ncc2' Service CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
D-Link DIR-820L is a dual-band cloud management wireless intelligent router from D-Link. TRENDnet TEW-731BR is a dual-band wireless router from TRENDnet. The following security vulnerabilities exist in various D-Link and RENDnet routers: 1. Local unauthorized vulnerabilities 2. Remote unauthorized vulnerabilities 3. Cross-site request forgery vulnerabilities. Attackers can use these vulnerabilities to perform unauthorized operations, gain unauthorized root permissions on the affected device, and take complete control of the affected device. The following products and versions are affected: D-Link DIR-820L (firmware version: Rev A) version 1.02B10, DIR-820L (firmware version: Rev A) version 1.05B03, DIR-820L (firmware version: Rev B) 2.01b02 Version; TRENDnet TEW-731BR (firmware version: Rev 2) version 2.01b01. Multiple D-Link and TRENDnet routers are prone to a local unauthenticated vulnerability, a remote unauthenticated vulnerability and a cross-site request-forgery vulnerability
VAR-201502-0124 CVE-2015-0594 Cisco Prime LAN Management Solution and Cisco Security Manager Used in Cisco Common Services Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun18263. Vendors have confirmed this vulnerability Bug ID CSCuq54654 and CSCun18263 It is released as.By any third party Web Script or HTML May be inserted. Cisco Security Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. These issues are being tracked by Cisco Bug IDs CSCuq54654 and CSCun18263. Cisco Common Services is a set of common management services used in network management equipment
VAR-201502-0156 CVE-2015-0632 Cisco IOS and IOS XE of Neighbor Discovery Service disruption in protocol implementation (DoS) Vulnerabilities CVSS V2: 5.7
CVSS V3: -
Severity: MEDIUM
Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770. Vendors have confirmed this vulnerability Bug ID CSCuo67770 It is released as.A large amount on a local network by a third party Router Solicitation Service disruption via message (DoS) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS/IOS XE Software that allows an attacker to initiate a denial of service attack and denial of service to legitimate users. Cisco IOS and IOS XE Software are prone to a remote denial-of-service vulnerability. Successful exploits may allow attackers to cause denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCuo67770
VAR-201502-0172 CVE-2015-0651 Cisco 4710 ACE Runs on the appliance Cisco ANM and Device Manager Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753. Vendors have confirmed this vulnerability Bug ID CSCuo99753 It is released as.A third party may be able to hijack the authentication of any user. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. This issue is being tracked by Cisco Bug ID's CSCuo99753 and CSCul84792
VAR-201505-0127 CVE-2014-8618 Fortinet FortiADC D Cross-site scripting vulnerability in login page for model theme CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the theme login page in Fortinet FortiADC D models before 4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Versions prior to FortiADC-D 4.2 are vulnerable. Fortinet FortiADC is an application delivery controller from Fortinet, which optimizes network availability, user experience, mobile performance and cloud-based enterprise application control, and enhances server efficiency and reduces data center network complexity. sex and cost. D is one of the modules
VAR-201505-0377 CVE-2015-3620 Fortinet FortiAnalyzer and FortiManager Advanced Dataset Report Page Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the advanced dataset reports page in Fortinet FortiAnalyzer 5.0.0 through 5.0.10 and 5.2.0 through 5.2.1 and FortiManager 5.0.3 through 5.0.10 and 5.2.0 through 5.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. FortiAnalyzer and FortiManager are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Both Fortinet FortiManager and FortiAnalyzer are products of Fortinet. Fortinet FortiManager is a centralized network security management solution. FortiAnalyzer is a centralized network security reporting solution
VAR-201505-0128 CVE-2014-8619 Fortinet FortiWeb Cross-site scripting vulnerability in the automatic learning settings page CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the autolearn configuration page in Fortinet FortiWeb 5.1.2 through 5.3.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Fortinet FortiWeb is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content
VAR-201505-0126 CVE-2014-8616 Fortinet FortiOS Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Fortinet FortiOS 5.2.x before 5.2.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to the (1) user group or (2) vpn template menus. Fortinet FortiOS is prone to multiple cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam
VAR-201503-0155 CVE-2014-8617 Fortinet FortiMail of WebGUI of Web Action Quarantine Release Cross-site scripting vulnerability in functionality CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the Web Action Quarantine Release feature in the WebGUI in Fortinet FortiMail before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5, and 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via the release parameter to module/releasecontrol. Fortinet FortiMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet FortiMail is an email information security device from Fortinet, which provides information filtering engine, anti-spam and threat defense functions. The vulnerability is caused by the fact that the module/releasecontrol URI does not sufficiently filter the 'release' parameter. The following versions are affected: Fortinet FortiMail prior to 4.3.9, 5.0.x prior to 5.0.8, 5.1.x prior to 5.1.5, 5.2.x prior to 5.2.3
VAR-201502-0128 CVE-2015-0555 Samsung iPOLiS Device Manager of XnsSdkDeviceIpInstaller.ocx ActiveX Control buffer overflow vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Buffer overflow in the XnsSdkDeviceIpInstaller.ocx ActiveX control in Samsung iPOLiS Device Manager 1.12.2 allows remote attackers to execute arbitrary code via a long string in the first argument to the (1) ReadConfigValue or (2) WriteConfigValue function. Samsung iPOLiS Device Manager is prone to multiple buffer-overflow vulnerabilities because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely result in denial-of-service conditions
VAR-201503-0333 CVE-2014-9206 Schneider Electric DTM Buffer Overflow Vulnerability CVSS V2: 6.9
CVSS V3: -
Severity: MEDIUM
Stack-based buffer overflow in Device Type Manager (DTM) 3.1.6 and earlier for Schneider Electric Invensys SRD Control Valve Positioner devices 960 and 991 allows local users to gain privileges via a malformed DLL file. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The Schneider Electric DTM has a buffer overflow vulnerability that could allow an attacker to execute arbitrary code or initiate a denial of service attack in the context of an application. Schneider Electric DTM is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. Schneider Electric DTM 3.1.6 and prior are vulnerable. A local attacker can exploit this vulnerability to gain permissions through a malformed DLL file
VAR-201502-0157 CVE-2015-0633 C-Series Run on the server Cisco Unified Computing System of Integrated Management Controller Vulnerable to access restrictions CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876. Cisco Unified Computing System C-Series are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuf52876. There is a security vulnerability in IMC in Cisco UCS 1.4(7h) and earlier versions of C-Series servers
VAR-201502-0205 CVE-2015-2055 Zhone GPON 2520 Service disruption in other firmware (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Zhone GPON 2520 with firmware R4.0.2.566b allows remote attackers to cause a denial of service via a long string in the oldpassword parameter. Zhone GPON 2520 The firmware in the service disruption (DoS) There are vulnerabilities that are put into a state.By a third party oldpassword Service disruption through excessively long strings of parameters (DoS) There is a possibility of being put into a state. Zhone GPON is prone to a denial-of-service vulnerability. Zhone GPON 2520 is a solution based on ITU-TG.984.x standard broadband passive optical integrated access standard of Zhone Company. A security vulnerability exists in Zhone GPON 2520 using R4.0.2.566b firmware
VAR-201502-0198 CVE-2015-2048 D-Link DCS-931L Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. D-Link DCS-931L Contains a cross-site request forgery vulnerability.Authentication may be hijacked by a third party. The D-Link DCS-931L is a remote wireless surveillance camera from D-Link. A remote attacker could exploit this vulnerability to perform unauthorized operations
VAR-201502-0199 CVE-2015-2049 D-Link DCS-93xL model family allows unrestricted upload CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Unrestricted file upload vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension. The D-Link DCS-93xL family of devices (specifically the DCS-930L, DCS-931L, DCS-932L, and DCS-933L models) allows an attacker to upload arbitrary files from the attackers system. The D-Link DCS-931L is a D-Link home wireless network camera
VAR-201502-0200 CVE-2015-2050 D-Link DAP-1320 Code Injection Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
D-Link DAP-1320 Rev Ax with firmware before 1.21b05 allows attackers to execute arbitrary commands via unspecified vectors. The D-Link DAP-1320 is a wireless network extender from D-Link. A security hole exists in D-Link DAP-1320 Rev Ax. D-Link DAP-1320 is prone to a command-injection vulnerability. Failed exploit attempts will likely result in denial-of-service conditions
VAR-201502-0201 CVE-2015-2051 D-Link DIR-645 Wired/Wireless Router Operating System Command Injection Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. The D-Link DIR-645 is a D-Link router that regulates wireless transmit power. Ax has a security vulnerability. D-Link DIR-645 Router Series are prone to a remote arbitrary command-execution vulnerability
VAR-201502-0228 CVE-2014-6184 plural OS Run on IBM Tivoli Storage Manager Client's dsmtca Vulnerable to stack-based buffer overflow CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. Successful exploits may allow attackers to execute arbitrary code in the context of the application with root privileges. Failed exploits may result in denial-of-service conditions. IBM Tivoli Storage Manager (TSM) is a set of backup and recovery management solutions of IBM Corporation in the United States. The solution supports data protection, space management and archiving, business recovery and disaster recovery, etc. The dsmtca program in the IBM TSM client has a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability to gain privileges. The following versions are affected: IBM TSM versions 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2.0.0 through 6.2.5.3 on UNIX, Linux and OS X platforms, Version 6.3.0.0 to version 6.3.2.2