VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201405-0470 CVE-2014-2193 Cisco Unified Web and E-mail Interaction Manager Vulnerable to inserting conversational text CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cisco Unified Web and E-Mail Interaction Manager places session identifiers in GET requests, which allows remote attackers to inject conversation text by obtaining a valid identifier, aka Bug ID CSCuj43084. Vendors have confirmed this vulnerability Bug ID CSCuj43084 It is released as.Conversation text may be inserted by a third party by obtaining a valid identifier. An attacker can leverage this issue to capture, modify, or conduct a brute force attack on a session identifier. This issue is being tracked by Cisco Bug ID CSCuj43084. Web Interaction Manager is a product that can help call center business representatives use websites and text chats or real-time Web collaboration to answer customer questions; E-mail Interaction Manager is a product used to manage a large number of customer emails submitted to corporate mailboxes or websites
VAR-201405-0472 CVE-2014-2195 Cisco Email Security Appliance Remote Security Bypass Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. Vendors have confirmed this vulnerability Bug ID CSCum86085 It is released as.A third party could gain the role's privileges by using the similarity of group names. The Cisco Email Security Appliance is an EMAIL security gateway from Cisco. AsyncOS is the operating system used by the product to handle bottlenecks in concurrent communications and file-based mail queues. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCum86085. A remote attacker could exploit this vulnerability to gain privileges
VAR-201405-0359 CVE-2014-3264 Cisco Adaptive Security Appliance Service disruption in software (DoS) Vulnerabilities CVSS V2: 6.3
CVSS V3: -
Severity: MEDIUM
Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) and earlier allows remote authenticated users to cause a denial of service (device reload) via crafted attributes in a RADIUS packet, aka Bug ID CSCun69561. Cisco ASA Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected system to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCun69561
VAR-201405-0360 CVE-2014-3265 Cisco Security Manager of Auto Update Server of Web Cross-site scripting vulnerability in the framework CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the Auto Update Server (AUS) web framework in Cisco Security Manager 4.2 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuo06900. Cisco Security Device Manager, Cisco Security Device Management Tool, referred to as SDM. It is a graphical router management tool provided by Cisco. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCuo06900. Security Manager 4.2 and prior are vulnerable. The vulnerability is caused by the program's insufficient validation parameters
VAR-201405-0363 CVE-2014-3268 Cisco Unified Border Element Run on device Cisco IOS Service disruption in (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 15.2(4)M4 on Cisco Unified Border Element (CUBE) devices allows remote attackers to cause a denial of service (input-queue consumption and traffic-processing outage) via crafted RTCP packets, aka Bug ID CSCuj72215. Vendors have confirmed this vulnerability Bug ID CSCuj72215 It is released as.Skillfully crafted by a third party RTCP Service disruption via packets ( Stop input queue consumption and traffic processing ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS. Allows remote attackers to cause denial of service through elaborate RTCP packets. Attackers can exploit this issue to cause the denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuj72215
VAR-201405-0365 CVE-2014-3270 Cisco IOS XR of DHCPv6 Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The DHCPv6 implementation in Cisco IOS XR allows remote attackers to cause a denial of service (process hang) via a malformed packet, aka Bug ID CSCul80924. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Attackers can exploit this issue to cause the affected device to hang, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCul80924
VAR-201405-0366 CVE-2014-3271 Cisco IOS XR of DHCPv6 Denial of service in implementation (DoS) Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The DHCPv6 implementation in Cisco IOS XR allows remote attackers to cause a denial of service (device crash) via a malformed packet, aka Bug IDs CSCum85558, CSCum20949, CSCul61849, and CSCul71149. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Attackers can exploit this issue to cause the affected device to crash, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCum85558, CSCum20949, CSCul61849, and CSCul71149
VAR-201405-0346 CVE-2014-3273 Cisco IOS of LLDP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
The LLDP implementation in Cisco IOS allows remote attackers to cause a denial of service (device reload) via a malformed packet, aka Bug ID CSCum96282. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The LLDP packet is sent to the LLDP-enabled device to overload the affected device. Cisco IOS Software is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCum96282
VAR-201405-0651 No CVE D-Link DGL-5500 has multiple vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The D-Link DGL-5500 is a router device. The D-Link DGL-5500 has a cross-site scripting and information disclosure vulnerability that allows attackers to exploit vulnerabilities to obtain sensitive information, bypass security restrictions or conduct cross-site scripting attacks.
VAR-201405-0652 No CVE Multiple vulnerabilities in D-Link DIR-855L and DIR-835 CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The D-Link DIR-855L and DIR-835 are router devices. There are several security vulnerabilities in D-Link DIR-855L and DIR-835: 1. The device fails to properly restrict access to the tools_admin.asp script, allowing attackers to exploit the vulnerability access restricted feature. 2. There is an error in processing requests through TCP 8080 and CGI/SSI/ accessing hnap.cgi to obtain sensitive information. 3. Inputs submitted via the \"action\" GET parameter are missing filtering before returning to the user, allowing remote attackers to exploit the vulnerability to inject malicious scripts or HTML code to obtain sensitive information or hijack user sessions when malicious data is viewed.
VAR-201405-0557 No CVE ARRIS SURFboard SBG6580 Series Wi-Fi Cale Modem Gateway Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem is a Wi-Fi cable modem. ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem has an information disclosure vulnerability that allows an attacker to exploit a vulnerability to obtain user interface authentication credentials and wireless network key values through a simple SNMP request. Arris SURFboard SBG6580 is a wireless gateway product from the American Arris Group. An information disclosure vulnerability exists in ARRIS SURFboard SBG6580. An attacker could use this vulnerability to obtain sensitive information. Vulnerabilities in ARRIS SURFboard 6.5.0.0-GA-00-226-NOSH version, other versions may also be affected. This may result in further attacks
VAR-201405-0471 CVE-2014-2194 Cisco Unified Web and E-mail Interaction Manager Vulnerability in CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
system/egain/chat/entrypoint in Cisco Unified Web and E-mail Interaction Manager 9.0(2) allows remote attackers to have an unspecified impact by injecting a spoofed XML external entity. Exploiting this issue may allow a remote attacker to perform unauthorized actions. This may lead to further attacks. This issue is being tracked by Cisco Bug ID CSCuj43080. Web Interaction Manager is a product that can help call center business representatives use websites and text chats or real-time Web collaboration to answer customer questions; E-mail Interaction Manager is a product used to manage a large number of customer emails submitted to corporate mailboxes or websites
VAR-201405-0364 CVE-2014-3269 Cisco IOS XE of SNMP Service disruption in modules (DoS) Vulnerabilities CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The SNMP module in Cisco IOS XE 3.5E allows remote authenticated users to cause a denial of service (device reload) by polling frequently, aka Bug ID CSCug65204. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. An attacker could exploit the vulnerability to cause the affected device to reload and refuse to serve legitimate users. This issue is being tracked by Cisco Bug ID CSCug65204
VAR-201405-0653 No CVE Huawei Campus Series Switches has multiple vulnerabilities CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Huawei Campus Series Switches is a switch device from Huawei. There are several vulnerabilities in Huawei Campus Series Switches: 1. There is an unspecified error that allows an attacker to exploit an exploit to perform an unauthorized firmware upgrade. 2. The BootRom Menu has an error that allows an attacker to exploit the vulnerability to bypass the system security check mechanism. 3. The BootRom Menu has an error that allows an attacker to exploit the vulnerability to control the device. The following devices are affected by this vulnerability: Huawei Campus S7700 firmware V200R001C00SPC300, V200R002C00SPC100 and V200R003C00SPC300Huawei Campus S9300 firmware V200R001C00SPC300, V200R002C00SPC100 and V200R003C00SPC300Huawei Campus S9700 firmware V200R001C00SPC300, V200R002C00SPC100 and V200R003C00SPC300
VAR-201405-0262 CVE-2014-0177 hub of lib/hub/commands.rb of am Vulnerability of function overwriting arbitrary files CVSS V2: 3.6
CVSS V3: -
Severity: LOW
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file. The HUB is a multi-port transponder. When the HUB is used as the center device, a certain line in the network has a fault and does not affect the work of other lines. Other attacks may also be possible
VAR-201405-0560 No CVE TP-Link TD-W89 Routers 'rom-0' File Unauthorized Access Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
TP-Link TD-W89 Routers is a router device. TP-LINK TD-W89 is a router product of China TP-LINK company. An unauthorized access vulnerability exists in the TP-LINK TD-W89 router. An attacker could use this vulnerability to gain access to sensitive information
VAR-201405-0469 CVE-2014-2192 Cisco Unified Web and E-mail Interaction Manager Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Cisco Unified Web and E-mail Interaction Manager 9.0(2) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuj43033. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCuj43033. Web Interaction Manager is a product that can help call center business representatives use websites and text chats or real-time Web collaboration to answer customer questions; E-mail Interaction Manager is a product used to manage a large number of customer emails submitted to corporate mailboxes or websites
VAR-201405-0518 CVE-2014-3735 Intel Indeo Video for ir41_32.ax Service disruption in (DoS) Vulnerabilities CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
ir41_32.ax 4.51.16.3 for Intel Indeo Video 4.5 allows remote attackers to cause a denial of service (crash) via a crafted .avi file. Intel Indeo Video is prone to a memory-corruption vulnerability. Attackers can exploit this issue to crash the affected application, resulting in a denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed. Intel Indeo Video 4.5 ir41_32.ax version 4.51.16.3 is vulnerable; other versions may also be affected
VAR-201405-0220 CVE-2014-1347 OS X Run on Apple iTunes File modification vulnerability CVSS V2: 4.4
CVSS V3: -
Severity: MEDIUM
Apple iTunes before 11.2.1 on OS X sets world-writable permissions for /Users and /Users/Shared during reboots, which allows local users to modify files, and consequently obtain access to arbitrary user accounts, via standard filesystem operations. iTunes is prone to multiple insecure file-permission vulnerabilities. Apple iTunes versions prior to 11.2.1 are vulnerable. Apple Apple iTunes is a set of media player applications of Apple (Apple), which is mainly used for playing and managing digital music and video files. The vulnerability is caused by the program setting global write permissions on the /Users and /Users/Shared directories during restart. This issue was addressed with improved permission handling. For information on the general content of iTunes 11.2.1, see http://support.apple.com/kb/TS5434 CVE-ID CVE-2014-1347 iTunes 11.2.1 may be obtained from: http://www.apple.com/itunes/download/ The download file is named: iTunes11.2.1.dmg Its SHA-1 digest is: d7e00140775bd15069ded529388add2ce6f0b538 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTdvWrAAoJEBcWfLTuOo7t1rgP+gL3Z02WLrsQb66XvuTEz9Ij KHKL/y3yXzMIdwEqFsHvcd8Ls9lBaiSFTkXIWXhgWsW8PZPFZBahprnbbszFmwJ6 P9g2QRWstQFpveImGdrMW3E9yjIf7YvkjD2NNNpG4NUXiejwWANJ1kmfHJ9ny1vs L8bIImea5+mTMt+fvrJp3vWGAhLSfJYc9HQvIqJxhESiAW0dOoprbkTGVPRbR5wE w7d1m5LS8nvmWi8blLKvLtv+AX2HJvLniJwYkZXa4kMUy25nYLrTZ09aRMfP2Ygg 4fjsIphrnpScl9gGaBYbp3vncR/g0Nypw0b3/ahlmBnEFFIXHJNjudoW8vbBdyaM 7x1A4y1iVregs7LKRwExhZGjc85WYJis1asVE4A0L8rjqjj/OskXUyFFZ2wKEwic apZPyeqGOPpdwa3CsHcq7RZZb1Y8aceeLviXKb2iOC37toRMnDkMr2SBd/xD6TfE fWxBbFnxsY+BFbfz9QUpvtmWI3a399vqt6J9RXxve/a/nd8XyCUdgTxhGSf+uUZ4 U6vJppHF+nzXjaua8L7z8RXxQDfjFm2pI9a3VfRjq50hrznCprXSIR148//WSiHJ Y6Ss5s+lHLedmdudW9Fsiywb0ImEK88bQtmHg4WqxOfFbC9X25262WhDN+m7KoGJ 4kQtMB6mjCY/WsU+frOA =P5hZ -----END PGP SIGNATURE-----
VAR-201405-0181 CVE-2014-3412 Juniper Junos Space Vulnerable to arbitrary command execution CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Unspecified vulnerability in Juniper Junos Space before 13.3R1.8, when the firewall in disabled, allows remote attackers to execute arbitrary commands via unspecified vectors. An remote attacker can exploit this issue to execute arbitrary code with root privileges. This may facilitate complete compromise of the affected device. Junos Space 13.1 and prior are vulnerable. Juniper Junos Space is a set of network management solutions from Juniper Networks. The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle