VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201308-0251 CVE-2013-4114 Nagstamon Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network. Nagstamon is a Nagios status monitor. These sensitive information can be obtained by obtaining the plaintext BASE64 data in the HTTP BASIC verification header. A remote attacker can exploit the vulnerability to obtain such sensitive information, such as authentication credentials. Nagstamon is prone to an information-disclosure vulnerability. Versions prior to Nagstamon 0.9.10 are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201401-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Nagstamon: Information disclosure Date: January 06, 2014 Bugs: #476538 ID: 201401-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in Nagstamon could expose user credentials to a remote attacker. Workaround ========== There is no known workaround at this time. Resolution ========== All Nagstamon users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=net-analyzer/nagstamon-0.9.11_rc1" References ========== [ 1 ] CVE-2013-4114 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4114 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201401-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
VAR-201307-0550 No CVE 3S Vision N1072/N1073/N3071 Network Cameras Hardcoded Credentials Security Bypass Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
3S Vision is a camera device. 3S N1072, N1073 and N3071 are all network cameras from Taiwan 3S. A security bypass vulnerability exists in 3S Vision N1072, N1073, N3071 Network Cameras, which originates from the use of hard-coded credentials in the program. An attacker could use this vulnerability to gain administrator access to the affected device. Vulnerabilities exist in the following versions: N1072 Network camera runs firmware version 1.07_STD-1, N1073 Network camera runs firmware version 1.02_STD-1, and N3071 Network camera runs firmware version 1.05_STD-1
VAR-201307-0261 CVE-2013-3655 Sharp AQUOS PhotoPlayer HN-PP150 Remote Denial of Service Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Sharp AQUOS PhotoPlayer HN-PP150 with firmware before 1.04.00.04 allows remote attackers to cause a denial of service (networking outage) via crafted packet data. AQUOS PhotoPlayer HN-PP150 contains an issue in the processing of packets, which may lead to a denial-of-service (DoS). Ayako Matsuda of FFRI, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Network functions may be disabled by a remote attacker. Sharp AQUOS PhotoPlayer HN-PP150 is a picture printing and playback device. A remote attacker could exploit this vulnerability to crash an application and deny service to legitimate users. Sharp AQUOS PhotoPlayer HN-PP150 running firmware 1.03.01.04 and earlier are vulnerable. Sharp AQUOS PhotoPlayer HN-PP150 is a photo player product of Sharp Corporation of Japan. This product provides slideshow presentation, photo printing and other functions
VAR-201307-0203 CVE-2013-3418 Cisco Unified Communications Domain Manager Service disruption in (DoS) Vulnerabilities CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cisco Unified Communications Domain Manager does not properly allocate memory for GET and POST requests, which allows remote authenticated users to cause a denial of service (memory consumption and process crash) via crafted requests to the management interface, aka Bug ID CSCud22922. Cisco Unified Communications Domain Manager is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the device to consume excessive CPU resources, resulting in denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCud22922. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
VAR-201307-0204 CVE-2013-3419 Cisco Unified MeetingPlace Web Conferencing Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Cisco Unified MeetingPlace Web Conferencing allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuh74981. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCuh74981
VAR-201307-0575 No CVE Asante Voyager I and II Network Camera Security Bypass Vulnerabilities CVSS V2: 6.0
CVSS V3: -
Severity: MEDIUM
Asante Voyager I and Voyager II are network cameras from Asante, USA. A security bypass vulnerability exists in Asante Voyager I and Voyager II Network Cameras, which stems from the program's use of hard-coded credentials. An attacker could use this vulnerability to gain administrator access to the affected device. There are vulnerabilities in the firmware version 2.08 running Voyager I and Voyager II Network Cameras. Other versions may also be affected
VAR-201307-0540 No CVE ALinking ALC-9451/ALC-9452 Network Camera Security Bypass Vulnerability CVSS V2: 6.0
CVSS V3: -
Severity: MEDIUM
ALinking ALC-9451 and ALC-9452 Network Cameras are the network camera products of Taiwan Alinking Company. There is a security bypass vulnerability in ALinking ALC-9451 and ALC-9452 Network Cameras, which stems from the program's use of hard-coded credentials. An attacker could use this vulnerability to gain administrator access to the affected device. ALC-9451 and ALC-9452 Network Cameras have vulnerabilities in version 1.33 of the firmware running. Other versions may also be affected
VAR-201307-0479 CVE-2013-4690 Juniper Networks SRX1400 , SRX3400 ,and SRX3600 Run on Junos Vulnerability in which important information is obtained CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Juniper Junos 10.4 before 10.4S13, 11.4 before 11.4R7-S1, 12.1 before 12.1R5-S3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on the SRX1400, SRX3400, and SRX3600 does not properly initialize memory locations used during padding of Ethernet packets, which allows remote attackers to obtain sensitive information by reading packet data, aka PR 829536, a related issue to CVE-2003-0001. Vendors have confirmed this vulnerability PR 829536 It is released as. This vulnerability CVE-2003-0001 And related issues.By reading the packet data by a third party, important information may be obtained. Multiple Juniper Gateway Products are prone to an information-disclosure vulnerability. Attackers can leverage this issue to gain access to sensitive information. Information obtained will aid in further attacks. Juniper Gateway Products SRX1400, SRX3400, and SRX3600 are vulnerable. Juniper Networks Juniper Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK
VAR-201307-0478 CVE-2013-4688 Juniper Networks SRX Runs on the device Junos of flowd Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
flowd in Juniper Junos 10.4 before 10.4R11 on SRX devices, when the MSRPC Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted MSRPC requests, aka PR 772834. Vendors have confirmed this vulnerability PR 772834 It is released as.Skillfully crafted by a third party MSRPC Service disruption via request ( Daemon crash ) There is a possibility of being put into a state. Juniper Networks Junos is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue will result in denial-of-service conditions. Juniper Networks Junos 10.4 is vulnerable; other versions may also be affected. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in flowd (the Flow daemon) in Juniper Junos 10.4 releases prior to 10.4R11 on SRX Series Server Gateway devices
VAR-201307-0477 CVE-2013-4687 Juniper Networks SRX Runs on the device Junos of flowd Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
flowd in Juniper Junos 10.4 before 10.4S14, 11.2 and 11.4 before 11.4R6-S2, and 12.1 before 12.1R6 on SRX devices, when certain Application Layer Gateways (ALGs) are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets, aka PRs 727980, 806269, and 835593. Juniper Networks Junos is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause the host system to crash, resulting in a denial-of-service condition. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in flowd in Juniper Junos 10.4 prior to 10.4S14, 11.4 prior to 11.2 and 11.4R6-S2, and 12.1 prior to 12.1R6 on SRX Series Server Gateway devices
VAR-201307-0476 CVE-2013-4686 Juniper Junos Service disruption in some kernels (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The kernel in Juniper Junos 10.4 before 10.4R14, 11.4 before 11.4R8, 11.4X27 before 11.4X27.43, 12.1 before 12.1R6, 12.1X44 before 12.1X44-D20, 12.2 before 12.2R4, and 12.3 before 12.3R2, in certain VLAN configurations with unrestricted arp-resp and proxy-arp settings, allows remote attackers to cause a denial of service (device crash) via a crafted ARP request, aka PR 842091. Juniper Networks Junos is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause the host system to crash, resulting in a denial-of-service condition. Junos 10.4, 11.4, 11.4X27, 12.1X44, 12.1, 12.2 and 12.3 are vulnerable. The operating system provides a secure programming interface and Junos SDK. Juniper Junos 10.4 before 10.4R14, 11.4 before 11.4R8, 11.4X27 before 11.4X27.43, 12.1 before 12.1R6, 12.1X44 before 12.1X44-D20, 12.2 before 12.2R4, There is a denial of service vulnerability in the 12.3 kernel before 12.3R2. The vulnerability stems from the lack of restrictions on the settings of arp-resp and proxy-arp in the VLAN configuration of the program
VAR-201307-0475 CVE-2013-4685 Juniper Networks SRX Runs on the device Junos of flowd Vulnerable to buffer overflow CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Buffer overflow in flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7, 12.1 before 12.1R6, and 12.1X44 before 12.1X44-D15 on SRX devices, when Captive Portal is enabled with the UAC enforcer role, allows remote attackers to execute arbitrary code via crafted HTTP requests, aka PR 849100. Vendors have confirmed this vulnerability PR 849100 It is released as.Skillfully crafted by a third party HTTP Arbitrary code may be executed via a request. Juniper Networks Junos is prone to a remote buffer-overflow vulnerability. Attackers may leverage this issue to execute arbitrary code in the context of the affected device. Failed exploit attempts may result in a denial-of-service condition. The operating system provides a secure programming interface and Junos SDK. Buffering exists in flowd (Flow Daemon) in Juniper Junos 10.4 releases prior to 10.4S14, 11.4 releases prior to 11.4R7, 12.1 releases prior to 12.1R6, and 12.1X44 releases prior to 12.1X44-D15 on SRX Series Server Gateway devices area overflow vulnerability
VAR-201307-0474 CVE-2013-4684 Juniper Networks SRX Runs on the device Junos of flowd Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R8, 12.1 before 12.1R7, and 12.1X44 before 12.1X44-D15 on SRX devices, when PIM and NAT are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted PIM packets, aka PR 842253. Juniper Networks Junos is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue will result in denial-of-service conditions. The operating system provides a secure programming interface and Junos SDK. Denial of service exists in flowd (Flow Daemon) in Juniper Junos 10.4 releases prior to 10.4S14, 11.4 releases prior to 11.4R8, 12.1 releases prior to 12.1R7, and 12.1X44 releases prior to 12.1X44-D15 on SRX Series Server Gateway devices loophole
VAR-201307-0299 CVE-2013-1132 Cisco Unified Communications Domain Manager Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unified Communications Domain Manager allow remote attackers to inject arbitrary web script or HTML via vectors involving the (1) IptAccountMgmt, (2) IptFeatureConfigTemplateMgmt, (3) IptFeatureDisplayPolicyMgmt, or (4) IptProviderMgmt page, aka Bug IDs CSCud69972, CSCud70193, and CSCud70261. Vendors report this vulnerability CSCud69972 , CSCud70193 ,and CSCud70261 Published as.By a third party, due to issues with the pages below, Web Script or HTML May be inserted. (1) IptAccountMgmt page (2) IptFeatureConfigTemplateMgmt page (3) IptFeatureDisplayPolicyMgmt page (4) IptProviderMgmt page. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. These issues are being tracked by Cisco Bug IDs CSCud69972, CSCud70193, and CSCud70261. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
VAR-201307-0202 CVE-2013-3416 Cisco Unified Operations Manager and Unified Service Monitor Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the web framework in the unified-communications management implementation in Cisco Unified Operations Manager and Unified Service Monitor allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuh47574 and CSCuh95997. Vendors have confirmed this vulnerability Bug ID CSCuh47574 and CSCuh95997 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco bug IDs CSCuh47574 and CSCuh95997
VAR-201307-0234 CVE-2013-3405 Cisco TelePresence Run on the endpoint TC Vulnerabilities that bypass software authentication CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071. Vendors have confirmed this vulnerability Bug ID CSCud96071 It is released as.Authentication may be bypassed by sending arbitrary passwords by a third party. Cisco TelePresence TC Software is prone to a remote authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and gain access to vulnerable devices. This may lead to further attacks. This issue is tracked by Cisco Bug ID CSCud96071. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a "face-to-face" virtual meeting room effect
VAR-201307-0484 No CVE Rockwell Automation RSLinx Enterprise LogReceiver Service denial of service vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RSLinx Enterprise is a standard OPC server software that bridges the communication between RSView Server and PLC. There is an out-of-bounds read error in the RSLinx Enterprise LogReceiver service. When the record size field in the received packet is larger than the actual number of received data, the service program will crash, causing a denial of service attack
VAR-201307-0485 No CVE Rockwell Automation RSLinx Enterprise LogReceiver Service Integer Overflow Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RSLinx Enterprise is a standard OPC server software that bridges the communication between RSView Server and PLC. The RSLinx Enterprise LogReceiver service does not properly check the record data size field when parsing received packets. The remote attacker can use this vulnerability to submit a specially crafted request to trigger an integer overflow, which can crash the service and cause a denial of service attack
VAR-201307-0523 No CVE Cisco WebEx One-Click Client Password Encryption Information Disclosure Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
Cisco WebEx is a set of Web conferencing tools from Cisco in the United States. This tool can assist remote office staff to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing, and enterprise instant messaging (IM). An information disclosure vulnerability exists in the Cisco WebEx One-Click Client. An attacker could use this vulnerability to gain sensitive information, such as stored passwords, which can help launch further attacks
VAR-201308-0079 CVE-2013-3319 SAP Netweaver of HostControl Service of GetComputerSystem Vulnerabilities that can capture important information in methods

Related entries in the VARIoT exploits database: VAR-E-201307-0007
CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The GetComputerSystem method in the HostControl service in SAP Netweaver 7.03 allows remote attackers to obtain sensitive information via a crafted SOAP request to TCP port 1128. SAP Netweaver is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. SAP Netweaver 7.03 and prior are vulnerable