VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201309-0003 CVE-2012-4073 Cisco Unified Computing System of Client's KVM Server spoofing vulnerability in subsystem CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
The KVM subsystem in the client in Cisco Unified Computing System (UCS) does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers, and read or modify KVM data, via a crafted certificate, aka Bug ID CSCte90332. Cisco Unified Computing System is prone to a security-bypass vulnerability. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which may aid in further attacks. This issue is tracked by Cisco Bug ID CSCte90332. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0004 CVE-2012-4074 Cisco Unified Computing System of Serial over LAN Vulnerabilities that can capture important information in subsystems CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
The Board Management Controller (BMC) in the Serial over LAN (SoL) subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded private key, which allows man-in-the-middle attackers to obtain sensitive information or modify the data stream by leveraging knowledge of this key, aka Bug ID CSCte90338. Vendors have confirmed this vulnerability Bug ID CSCte90338 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) By using hard-coded key information, important information may be obtained or the data stream may be changed. Cisco Unified Computing System is prone to an information-disclosure vulnerability in the implementation of Serial over LAN (SoL). Attackers can exploit this issue to obtain the private key and use it to decrypt traffic between end user and affected system. Successfully exploiting this issue allows attackers to view or modify Serial over LAN (SoL) communications by performing man-in-the-middle attacks. This issue is tracked by Cisco Bug ID CSCte90338. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0016 CVE-2012-4093 Cisco Unified Computing System Manager Service disruption in components (DoS) Vulnerabilities CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
The Manager component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service via an invalid Smart Call Home contact address, aka Bug ID CSCtl00186. Cisco Unified Computing System is prone to a local denial-of-service vulnerability because it fails to fails to properly validate user-supplied input. Local attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCtl00186. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0036 CVE-2013-1121 Cisco NX-OS of BGP Implementation of regex Service disruption in engines (DoS) Vulnerabilities CVSS V2: 5.4
CVSS V3: -
Severity: MEDIUM
The regex engine in the BGP implementation in Cisco NX-OS, when a complex regular expression is configured for inbound routes, allows remote attackers to cause a denial of service (device reload) via a crafted AS path set, aka Bug ID CSCuf49554. ( Device reload ) There are vulnerabilities that are put into a state. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. A BGP code implementation in Cisco NX-OS Software has a security vulnerability that allows unauthenticated remote attackers to overload affected devices. The vulnerability can be triggered if the affected device has a complex regular expression applied to the inbound route, and the vulnerability can be successfully triggered to trigger a Cisco NX-OS Software reboot. Cisco NX-OS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco bug ID CSCuf49554. Cisco NX-OS is a data center-oriented operating system developed by Cisco. The vulnerability stems from an error in the regular expression engine's handling of complex regular expressions
VAR-201309-0178 CVE-2013-1729 Mozilla Firefox of WebGL Implementation of desktop screenshot data vulnerability CVSS V2: 2.6
CVSS V3: -
Severity: LOW
The WebGL implementation in Mozilla Firefox before 24.0, when NVIDIA graphics drivers are used on Mac OS X, allows remote attackers to obtain desktop-screenshot data by reading from a CANVAS element. Mozilla Firefox is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information that may aid in further attacks. Note: This issue was previously discussed in BID 62447 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2013-76 through -92 Multiple Vulnerabilities), but has been moved to its own record to better document it. This issue is fixed in: Firefox 24.0
VAR-201309-0045 CVE-2013-1034 Apple Mac OS X Server of Wiki Server cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Wiki Server in Apple Mac OS X Server before 2.2.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-17-1 OS X Server v2.2.2 OS X Server v2.2.2 is now available and addresses the following: ClamAV Available for: OS X Mountain Lion v10.8 or later Impact: Multiple vulnerabilities in ClamAV Description: Multiple vulnerabilities existed in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.97.8. CVE-ID CVE-2013-2020 CVE-2013-2021 PostgreSQL Available for: OS X Mountain Lion v10.8 or later Impact: Multiple vulnerabilities in PostgreSQL Description: Multiple vulnerabilities existed in PostgreSQL, the most serious of which may lead to data corruption or privilege escalation. This update addresses the issues by updating PostgreSQL to version 9.2.4. These issues were addressed by improved encoding of HTML output. CVE-ID CVE-2013-1034 : David Hoyt of Hoyt LLC Research OS X Server v2.2.2 may be obtained from Mac App Store. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSOJFGAAoJEPefwLHPlZEwb1cQAIKRQDJfjJefWGq0xdIUQdtp QIZAU1OiWqThnAXSvGXINy1bj1LxtaTveS0ccxVpmWR6CxGhm3+CMHcIeLjXz16a ZKD1ABZiy+dfaVO+ESu9oA6FMkjUyUMoWiwlleHYRFtDWlAutcFKQYVcmRp0p+zz UYl7sHOIvWmOwY/If4EDOVPKtcBJe0u41PdpGJiNM7GRoWjk3MRlfdScpa+/EHqv r/QQBjt1ukFuyqPJqaBtyRbIEry2a364J7TlP/OeQcafU/GbYaXo0xF2BkxoLrkE zUyqJ1O+w3QzJfKOr2W/Xq3a2KLfBm/IF0tTkwRM8TFaGNoAd9nBExd285Xe/TUk m+/7C3KgbLvAbnBAUdCsnViPuW5KQc1bcM1DN6yjrh61ZOGttfvbNPWjRjx5FZM1 OrbXCWsmQA79wz1lzi2xK7XV1pYpQXVcUrPhkgfD8f+tt/VimL4nvcFRw+uylWoE UT93IvSaZ0lXCKrk4DNzDpji/IuFtddF6ZhGAC/mRgz9fsnJZ/dLrXTwhe6Hexlq 0v2oGvFKGJI7cGASCZ7EN6oK0bjbX+nGQHsuWfGh51B6eSdaPg7+9AtJGFNw2mSM 3vijZXbplvnRGIbajkpAHOk3o2fLnlZG4W4IMoe8GiT/lurnS2TOsY5AWnnPIC06 TqkNrkh5Zmj5JttbFNnt =UcAp -----END PGP SIGNATURE-----
VAR-201309-0595 No CVE NetVanta 3430 WEB Interface Default Management Account Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The NetVanta 3430 is a router device. The NetVanta 3430 has a default user account \"admin/password\" that allows remote attackers to use the account to gain unauthorized access to the device.
VAR-201309-0591 No CVE Moxa OnCell G3100 WEB Interface Default Management Account Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Moxa OnCell G3100 is an industrial grade IP gateway. The Moxa OnCell G3100 has a default user account \"admin/password\" that allows remote attackers to use the account to gain unauthorized access to the device.
VAR-201309-0592 No CVE Seagate BlackArmor NAS 110 / 220 WEB Interface Default Management Account Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The Seagate BlackArmor NAS is a network storage device. Seagate BlackArmor NAS 110 / 220 has a default user account \"admin/admin\" that allows remote attackers to use this account to gain unauthorized access to the device.
VAR-201309-0596 No CVE Seagate BlackArmor NAS 110 / 220 machine_desc parameter cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The Seagate BlackArmor NAS is a network storage device. The Seagate BlackArmor NAS 110 / 220 /admin/system_general.php script incorrectly filters the input submitted by the 'machine_desc' parameter, allowing remote attackers to exploit the vulnerability to inject malicious scripts or HTML code to obtain sensitive information or hijack users when malicious data is viewed Conversation.
VAR-201402-0087 CVE-2013-2817 Mitsubishi MC-WorX 'IcoLaunch.dll'' ActiveX Control Remote Code Execution Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user-assisted remote attackers to execute arbitrary programs via a crafted HTML document in conjunction with a Login Client button click. Mitsubishi MC-WorkX is a factory automation application tool. Mitsubishi MC-WorX is prone to a remote code-execution vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. Mitsubishi MC-WorX 8.02 is vulnerable; other versions may also be affected
VAR-201309-0500 No CVE ONO Hitron CDE-30364 has multiple cross-site request forgery vulnerabilities CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The ONO Hitron CDE-30364 WEB interface has a cross-site request forgery vulnerability that allows remote attackers to exploit exploits to build specially crafted URIs, to entice login users to resolve, and to change router parameters. ONO Hitron CDE-30364 is a wireless router product. There are multiple cross-site request forgery vulnerabilities in ONO Hitron CDE-30364. Unauthorized attackers can use these vulnerabilities to perform administrator actions and gain access to affected devices
VAR-201309-0168 CVE-2013-3613 Dahua Security DVRs contain multiple vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port. Digital video recorders (DVR) produced by Dahua Technology Co., Ltd. contain multiple vulnerabilities that could allow a remote attacker to gain privileged access to the devices. Dahua Security DVR Appliances accept UPnP requests from external untrusted devices, which can cause the telnet port of the DVR application device to be automatically redirected and accessed by external entities. These default conditions allow external attackers to detect the device and use the built-in account to authenticate. Access the device. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
VAR-201309-0433 CVE-2013-5494 Cisco Unified MeetingPlace Solution of Web Cross-site request forgery vulnerability in framework CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco Unified MeetingPlace Solution, as used in Unified MeetingPlace Web Conferencing and Unified MeetingPlace, allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCui45209 and CSCui44674. Vendors have confirmed this vulnerability Bug ID CSCui45209 and CSCui44674 It is released as.A third party may be able to hijack the authentication of any user. Exploiting this issue may allow a remote attacker to perform certain actions in the context of an authorized user's session and gain unauthorized access to the affected application; other attacks are also possible. A remote attacker can hijack the authentication of any user
VAR-201309-0434 CVE-2013-5495 Cisco Unified MeetingPlace of Application Server of Web Cross-site scripting vulnerability in the framework CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the web framework in the Application Server in Cisco Unified MeetingPlace allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCui44681. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCui44681. This solution provides a user environment that integrates voice, video and Web conferencing
VAR-201309-0435 CVE-2013-5496 Cisco NX-OS of Open Network Environment Platform Service disruption in (DoS) Vulnerabilities CVSS V2: 6.3
CVSS V3: -
Severity: MEDIUM
Open Network Environment Platform (ONEP) in Cisco NX-OS allows remote authenticated users to cause a denial of service (network-element reload) via a crafted packet, aka Bug ID CSCui51551. This issue is being tracked by Cisco Bug ID CSCui51551. NX-OS is an operating system for data centers
VAR-201309-0338 CVE-2013-5751 SAP NetWeaver Directory Traversal Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Directory traversal vulnerability in SAP NetWeaver 7.x allows remote attackers to read arbitrary files via unspecified vectors. SAP NetWeaver is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. This may aid in further attacks
VAR-201309-0450 CVE-2013-5482 Cisco Prime LAN Management Solution Vulnerable to clickjacking CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cisco Prime LAN Management Solution (LMS) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCug77823. This is a cross-frame scripting (XFS) Vulnerability related to the problem. Vendors have confirmed this vulnerability Bug ID CSCtk77823 It is released as.Skillfully crafted by a third party Web A clickjacking attack may be performed through the site, and other attacks may be performed. Successful exploits will allow attackers to bypass the same-origin policy and obtain potentially sensitive information; other attacks are possible. The solution configures, manages, monitors and maintains the network
VAR-201309-0432 CVE-2013-5493 Cisco Virtualization Experience Client Vulnerabilities that can bypass access restrictions in some firmware CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The diagnostic module in the firmware on Cisco Virtualization Experience Client 6000 devices allows local users to bypass intended access restrictions and execute arbitrary commands via unspecified vectors, aka Bug ID CSCug68407. Local authenticated attackers can exploit this issue to execute arbitrary commands on the underlying operating system. This issue is being tracked by Cisco bug ID CSCug68407. The administrative web interface is a web management interface running on it
VAR-201309-0478 No CVE Cogent DataHub Remote Denial of Service Vulnerability (CNVD-2013-12945) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cogent DataHub is software for SCADA and automation. Cogent DataHub (vd_cdatahub) contains an unspecified security vulnerability that allows a remote attacker to exploit a vulnerability to crash the system