VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201307-0295 CVE-2013-0567 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling B2B Integrator is a set of software that integrates B2B processes, transactions and relationships of different partner communities
VAR-201307-0296 CVE-2013-0568 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0072 CVE-2013-2982 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerable to uploading arbitrary files CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. Multiple IBM product are prone to an arbitrary file-upload vulnerability. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application
VAR-201307-0065 CVE-2013-2985 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0066 CVE-2013-2987 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0074 CVE-2013-3020 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0196 CVE-2013-3399 Cisco Desktop Collaboration Experience DX650 Unspecified Android API Vulnerable to buffer overflow CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Buffer overflow in an unspecified Android API on the Cisco Desktop Collaboration Experience DX650 allows attackers to execute arbitrary code via vectors that leverage incorrect memory allocation, aka Bug IDs CSCuf93957, CSCug22352, and CSCug22462. Vendors have confirmed this vulnerability Bug ID CSCuf93957 , CSCug22352 ,and CSCug22462 It is released as.An attacker could execute arbitrary code by exploiting improper memory allocation. Local attackers can exploit this issue to run arbitrary code with elevated privileges. Failed exploit attempts can result in a denial-of-service condition. This issue is being tracked by Cisco Bug IDs CSCuf93957, CSCug22352, and CSCug22462. The product provides uninterrupted, highly secure and integrated unified communications, high-definition (HD) video, network collaboration and more
VAR-201307-0411 CVE-2013-4748 TYPO3 for News system In the extension SQL Injection vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
SQL injection vulnerability in the News system (news) extension before 1.3.3 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. MSM camera driver for the Linux kernel is a Qualcomm platform camera driver project based on the Linux kernel. A stack-based buffer overflow vulnerability exists in the MSM camera driver used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products. An attacker could exploit this vulnerability to gain elevated privileges when processing parameters passed to the VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO or VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl subdev handlers. TYPO3 is a free and open source content management system (framework) (CMS/CMF) maintained by the Swiss TYPO3 Association. News system (news) is one of the extended components that provides news release functions
VAR-201307-0128 CVE-2013-0463 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0292 CVE-2013-0558 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerability in which important information is obtained CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0195 CVE-2013-3395 plural Cisco Security Appliance Web Cross-site request forgery vulnerability in framework

Related entries in the VARIoT exploits database: VAR-E-201307-0312
CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in the web framework on Cisco IronPort Web Security Appliance (WSA) devices, Email Security Appliance (ESA) devices, and Content Security Management Appliance (SMA) devices allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCuh70263, CSCuh70323, and CSCuh26634. Vendors have confirmed this vulnerability Bug IDs CSCuh70263 , CSCuh70323 ,and CSCuh26634 It is released as.A third party may be able to hijack arbitrary user authentication. Multiple Cisco Devices are prone to a cross-site request-forgery vulnerability. Attackers can exploit this issue to perform certain administrative actions and to gain unauthorized access to the affected device. This issue is being tracked by Cisco bug IDs CSCuh70323, CSCuh26634, and CSCuh70263. Content SMA is a set of content security management equipment. A remote attacker could exploit this vulnerability to hijack the authentication of any user. =============================== - Advisory - =============================== Tittle: Cisco IronPort Security Management Appliance - Multiple issues Risk: Medium Date: 20.May.2013 Author: Pedro Andujar Twitter: @pandujar .: [ INTRO ] :. The Cisco Security Management Appliance helps to enable flexible management and comprehensive security control at the network gateway. .: [ TECHNICAL DESCRIPTION ] :. Cisco IronPort Security Management Appliance M170 v7.9.1-030 (and probably other products), are prone to several security issues as described below; .: [ ISSUE #1 }:. Name: Reflected Cross Site Scripting Severity: Low CVE: CVE-2013-3396 There is a lack of output escaping in the default error 500 page. When a exception occurs in the application, the error description contains user unvalidated input from the request: ** PoC removed as requested by Cisco. ** .: [ ISSUE #2 }:. Name: Stored Cross Site Scripting Severity: Medium Due to a lack of input validation on job_name, job_type, appliances_options and config_master parameters which are then printed unscapped on job_name, old_job_name, job_type, appliance_lists and config_master fields. ** PoC removed as requested by Cisco. ** .: [ ISSUE #3 }:. Name: CSRF Token is not used Severity: Low CVE: CVE-2013-3395 CSRFKey is not used in some areas of the application, which make even easier to exploit Reflected XSS Issues. In the /report area of the application, we got no error even when completely removing the parameter CSRFKey; ** PoC removed as requested by Cisco. ** See: http://tools.cisco.com/security/center/viewAlert.x?alertId=29844 .: [ ISSUE #4 }:. Name: Lack of password obfuscation Severity: Low When exporting the configuration file even if you mark the "mask password" option, the SNMPv3 password still appears in cleartext. .: [ CHANGELOG ] :. * 20/May/2013: - Vulnerability found. * 27/May/2013: - Vendor contacted. * 11/Jul/2013: - Public Disclosure .: [ SOLUTIONS ] :. Thanks to Stefano De Crescenzo (Cisco PSIRT Team), because of his professional way of managing the entire process. Stored XSS CSCuh24755 Reflected XSS http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3396 SNMP password issue CSCuh27268, CSCuh70314 CSRF http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3395 .: [ REFERENCES ] :
VAR-201309-0333 CVE-2013-5740 plural Intel Used in products Intel Trusted Execution Technology SINIT Authenticated Code Modules In Trusted Execution Technology Vulnerabilities that circumvent protection mechanisms CVSS V2: 6.9
CVSS V3: -
Severity: MEDIUM
Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. Successful exploits will allow local processes to gain elevated privileges. This may facilitate a complete compromise of affected computers
VAR-201307-0298 CVE-2013-0539 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerable to session hijacking CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote attackers to hijack sessions, and consequently obtain sensitive information, via a brute-force attack. IBM Sterling B2B Integrator and IBM Sterling File Gateway is prone to a session-hijacking vulnerability. An attacker can exploit this issue to gain unauthorized access to the affected application. The following products are vulnerable: IBM Sterling B2B Integrator 5.2 and 5.1 IBM Sterling File Gateway 2.2 and 2.1. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0122 CVE-2013-0455 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2.4 and Sterling File Gateway allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. This vulnerability CVE-2013-2983 Is a different vulnerability.By any third party Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network
VAR-201307-0073 CVE-2013-2983 IBM Sterling File Gateway and Sterling B2B Integrator Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: -
Severity: LOW
Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling File Gateway 2.2 and Sterling B2B Integrator allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2013-0468. This vulnerability CVE-2013-0455 Is a different vulnerability.By any third party Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. These vulnerabilities stem from the program's failure to validate user-submitted input
VAR-201307-0230 CVE-2013-3401 Cisco TelePresence TC Software SIP Unintentional in the implementation of NOTIFY Vulnerabilities that trigger the use of messages CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080. Vendors have confirmed this vulnerability Bug ID CSCud96080 It is released as.Not intended by third parties NOTIFY May trigger the use of messages. Exploiting this issue could allow an attacker to bypass certain security restrictions and perform unauthorized actions on the affected device. This issue is being tracked by Cisco Bug ID CSCud96080. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a "face-to-face" virtual meeting room effect
VAR-201307-0123 CVE-2013-0456 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerable to session hijacking CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path. An attacker can exploit this issue to gain unauthorized access to the affected application. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker can exploit this vulnerability to hijack a session by modifying the cookie path
VAR-201307-0064 CVE-2013-2984 IBM Sterling B2B Integrator and Sterling File Gateway Vulnerable to directory traversal CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker could exploit this vulnerability to read or modify restricted files
VAR-201307-0369 CVE-2013-3581 Choice Wireless Green Packet 4G WiMax modem vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to obtain sensitive information via an Ajax (1) wmxState or (2) netState request. An attacker can exploit this issue to view system configuration information, execute commands and disclose sensitive information. Information obtained may aid in further attacks. This product provides internal routing, wireless link and other functions
VAR-201306-0355 CVE-2013-4731 Choice Wireless Green Packet 4G WiMax modem vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581. A remote attacker can exploit the vulnerability to execute arbitrary commands and obtain sensitive information such as an administrator account