VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201304-0412 CVE-2013-2779 Cisco ASR 1000 Series Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164. Vendors have confirmed this vulnerability Bug ID CSCub34945 It is released as. This vulnerability CVE-2013-1164 Is a different vulnerability.Fragmented by a third party IPv6 of MVPN Service disruption via packets ( Reload card ) There is the ability to be put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS XE is prone to a remote denial-of-service vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. The vulnerability stems from the fact that the program does not correctly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) function
VAR-201304-0136 CVE-2013-0132 Plesk Panel 11.0.9 privilege escalation vulnerabilities CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The suexec implementation in Parallels Plesk Panel 11.0.9 contains a cgi-wrapper whitelist entry, which allows user-assisted remote attackers to execute arbitrary PHP code via a request containing crafted environment variables. Plesk Panel 11.0.9 and possibly earlier versions contains multiple privilege escalation vulnerabilities. Parallels Plesk Panel is a web hosting control panel with integrated web design, SaaS marketplace and payment system. The Plesk / usr / sbin / suexec program (the program may be unknown elsewhere, but the file name is always suexec) allows CGI wrappers (cgi-wrapper) to be called to bypass restrictions on file ownership. Parallels Plesk Panel is prone to a local security-bypass vulnerability. Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions
VAR-201304-0010 CVE-2012-5937 plural IBM Vulnerability to execute arbitrary commands in the product CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors. An attacker can exploit this issue to execute arbitrary shell commands (Unix or Windows command or scripts) within the context of the application. The software supports secure integration of complex B2B processes with diverse partner communities. The vulnerability stems from an unspecified bug in the CLA2 server
VAR-201304-0282 CVE-2013-1149 Cisco ASA and FWSM Service disruption in other software (DOS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-201304-0169
CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267. Vendors have confirmed this vulnerability Bug ID CSCub85692 , CSCud20267 It is released as.Skillfully crafted by a third party IKEv1 Service disruption via message ( Device reload ) There is a possibility of being put into a state. Multiple Cisco products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCub85692 and CSCud20267
VAR-201304-0283 CVE-2013-1150 Cisco Adaptive Security Appliance Service disruption in authentication proxy implementations (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-201304-0011
CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The authentication-proxy implementation on Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.31), 8.1 and 8.2 before 8.2(5.38), 8.3 before 8.3(2.37), 8.4 before 8.4(5.3), 8.5 and 8.6 before 8.6(1.10), 8.7 before 8.7(1.4), 9.0 before 9.0(1.1), and 9.1 before 9.1(1.2) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCud16590. An attacker can exploit this issue to reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCud16590. This vulnerability exists in the following versions: 7.x prior to 7.2(5.10), 8.0 prior to 8.0(5.31), 8.1 and 8.2 prior to 8.2(5.38), 8.3 prior to 8.3(2.37), 8.4(5 ) before 8.4, 8.5(1.17) before 8.5, 8.6(1.10) before 8.6, 8.7(1.3) before 8.7, and 9.1(1.2) before 9.1
VAR-201304-0279 CVE-2013-1151 Cisco Adaptive Security Appliances Service disruption in (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-201304-0228
CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.31), 8.1 and 8.2 before 8.2(5.38), 8.3 before 8.3(2.37), 8.4 before 8.4(5), 8.5 before 8.5(1.17), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3) allow remote attackers to cause a denial of service (device reload) via a crafted certificate, aka Bug ID CSCuc72408. Vendors have confirmed this vulnerability Bug ID CSCuc72408 It is released as.Service disruption through a crafted certificate by a third party ( Device reload ) There is a possibility of being put into a state. An attacker can exploit this issue to reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuc72408. This vulnerability exists in the following versions: 7.x prior to 7.2(5.10), 8.0 prior to 8.0(5.31), 8.1 and 8.2 prior to 8.2(5.38), 8.3 prior to 8.3(2.37), 8.4(5 ) before 8.4, 8.5 (1.17) before 8.5, 8.6 (1.10) before 8.6, and 8.7 (1.3) before 8.7
VAR-201304-0280 CVE-2013-1152 Cisco Adaptive Security Appliances Service disruption in (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-201304-0291
CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco Adaptive Security Appliances (ASA) devices with software 9.0 before 9.0(1.2) allow remote attackers to cause a denial of service (device reload) via a crafted field in a DNS message, aka Bug ID CSCuc80080. An attacker can exploit this issue to reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuc80080
VAR-201304-0281 CVE-2013-1155 Cisco FWSM Service disruption in software (DOS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624. An attacker can exploit this issue to cause a vulnerable device to reload, triggering a denial-of-service condition. This issue is tracked by Cisco Bug ID CSCtg02624
VAR-201304-0269 CVE-2013-1164 Cisco ASR 1000 Series Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS XE 3.4 before 3.4.4S, 3.5, and 3.6 on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 multicast packets, aka Bug ID CSCtz97563. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A security vulnerability exists in Cisco IOS XE software that allows unauthenticated remote attackers to conduct denial of service attacks. This vulnerability is triggered by traffic that passes through or is targeted to the affected device. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCtz97563 and CSCub34945
VAR-201304-0147 CVE-2013-0687 MiCOM S1 Studio Access Security Bypass Vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file. MiCOM S1 Studio Software is a parameter that allows the user to modify or manage the generator protection unit. MiCOM S1 Studio Software does not restrict user access to installed executables. Malicious users who can access the local system can replace malicious files in the MiCOM S1 Studio Program Files directory. When the MiCOM S1 Studio application is executed, malicious programs are randomly replaced. run. MiCOM S1 Studio is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. It provides users with easy-to-operate and powerful management and debugging functions. The interface is more intuitive, the function is more powerful, and it is more convenient to use
VAR-201304-0270 CVE-2013-1165 Cisco ASR 1000 Series Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS XE 2.x and 3.x before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) allows remote attackers to cause a denial of service (card reload) by sending many crafted L2TP packets, aka Bug ID CSCtz23293. Vendors have confirmed this vulnerability Bug ID CSCtz23293 It is released as.Skillfully crafted by a third party L2TP Service disruption via packets ( Reload card ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The Cisco 1000 ASR does not correctly handle special L2TP packets, allowing an attacker to send a large number of L2TP packets to overload the system and cause a denial of service attack. The communication with the target affected device cannot trigger this vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. Repeated attacks will result in a sustained denial of service. This issue is being tracked by Cisco Bug ID CSCtz23293
VAR-201304-0271 CVE-2013-1166 Cisco ASR 1000 Series Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS XE 3.2 through 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR), when VRF-aware NAT and SIP ALG are enabled, allows remote attackers to cause a denial of service (card reload) by sending many SIP packets, aka Bug ID CSCuc65609. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This vulnerability could not be triggered by SIP traffic targeted to the affected device. Cisco IOS XE is prone to a remote denial-of-service vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. Repeated attacks will result in a sustained denial of service. This issue is being tracked by Cisco Bug ID CSCuc65609
VAR-201304-0272 CVE-2013-1167 Cisco ASR 1000 Series router Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco IOS XE 3.2 through 3.4 before 3.4.2S, and 3.5, on 1000 series Aggregation Services Routers (ASR), when bridge domain interface (BDI) is enabled, allows remote attackers to cause a denial of service (card reload) via packets that are not properly handled during the processing of encapsulation, aka Bug ID CSCtt11558. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The communication with the target affected device cannot trigger this vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. Repeated attacks will result in a sustained denial of service. This issue is being tracked by Cisco Bug ID CSCtt11558
VAR-201304-0273 CVE-2013-1168 Cisco Unified MeetingPlace Application Server of Web Server hijacking vulnerability CVSS V2: 7.6
CVSS V3: -
Severity: HIGH
The web server in Cisco Unified MeetingPlace Application Server 7.x before 7.1MR1 Patch 2, 8.0 before 8.0MR1 Patch 1, and 8.5 before 8.5MR3 Patch 1 does not invalidate a session upon a logout action, which makes it easier for remote attackers to hijack sessions by leveraging knowledge of a session cookie, aka Bug ID CSCuc64885. Vendors have confirmed this vulnerability Bug ID CSCuc64885 It is released as.The third party Cookie Using the information can hijack a session. Cisco Unified MeetingPlace is prone to an authentication-bypass vulnerability. Attackers can exploit this issue to gain unauthorized access to the affected application and perform arbitrary actions. This issue is being tracked by Cisco Bug ID CSCuc64885. This solution provides a user environment that integrates voice, video and Web conferencing
VAR-201304-0274 CVE-2013-1169 Cisco Unified MeetingPlace Web Conferencing Server Vulnerabilities impersonating users CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Cisco Unified MeetingPlace Web Conferencing Server 7.x before 7.1MR1 Patch 2, 8.0 before 8.0MR1 Patch 2, and 8.5 before 8.5MR3 Patch 1, when the Remember Me option is used, does not properly verify cookies, which allows remote attackers to impersonate users via a crafted login request, aka Bug ID CSCuc64846. Vendors have confirmed this vulnerability Bug ID CSCuc64846 It is released as.Skillfully crafted by a third party login It is possible to impersonate a user via a request. Cisco Unified MeetingPlace is prone to an arbitrary login security vulnerability. A remote attacker can exploit this issue to impersonate a legitimate user and send arbitrary commands to the affected system. This issue is being tracked by Cisco Bug ID CSCuc64846. Cisco Unified MeetingPlace is a set of multimedia conferencing solutions of Cisco (Cisco). This solution provides a user environment that integrates voice, video and Web conferencing. The vulnerability comes from the fact that the program does not verify the COOKIE correctly when the Remember Me option is enabled
VAR-201304-0275 CVE-2013-1170 Cisco Prime Network Control System Vulnerability to change database settings on appliance CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
The Cisco Prime Network Control System (NCS) appliance with software before 1.1.1.24 has a default password for the database user account, which makes it easier for remote attackers to change the configuration or cause a denial of service (service disruption) via unspecified vectors, aka Bug ID CSCtz30468. ( Service interruption ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCtz30468 It is released as.The setting is changed by a third party or service operation is interrupted ( Service interruption ) There is a possibility of being put into a state. Cisco Prime Network Control Systems is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCtz30468. The platform can be used to monitor and troubleshoot wired and wireless LANs. A remote attacker could exploit this vulnerability through an unknown vector to modify the configuration or cause a denial of service (blocked service)
VAR-201304-0284 CVE-2013-1172 Cisco AnyConnect Secure Mobility Client Vulnerability gained in CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
The Cisco Security Service in Cisco AnyConnect Secure Mobility Client (aka AnyConnect VPN Client) does not properly verify files, which allows local users to gain privileges via unspecified vectors, aka Bug ID CSCud14153. Vendors have confirmed this vulnerability Bug ID CSCud14153 It is released as.Authority may be obtained by local users. Local attackers can exploit these issues to gain elevated SYSTEM privileges. Successful exploits will result in the complete compromise of affected computers. This issue is being tracked by Cisco Bug ID CSCud14153
VAR-201304-0285 CVE-2013-1173 Cisco AnyConnect Secure Mobility Client Heap-based buffer overflow vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Heap-based buffer overflow in ciscod.exe in the Cisco Security Service in Cisco AnyConnect Secure Mobility Client (aka AnyConnect VPN Client) allows local users to gain privileges via unspecified vectors, aka Bug ID CSCud14143. Vendors have confirmed this vulnerability Bug ID CSCud14143 It is released as.Authority may be obtained by local users. Local attackers can exploit this issue to gain elevated SYSTEM privileges. Successful exploits will result in the complete compromise of affected computers. This issue is being tracked by Cisco Bug ID CSCud14143
VAR-201304-0254 CVE-2013-1189 Cisco Universal broadband 10000 Service operation interruption in series routers (DoS) Vulnerabilities CVSS V2: 5.7
CVSS V3: -
Severity: MEDIUM
Cisco Universal Broadband (aka uBR) 10000 series routers, when an IPv4/IPv6 dual-stack modem is used, allow remote attackers to cause a denial of service (routing-engine reload) via unspecified changes to IP address assignments, aka Bug ID CSCue15313. The Cisco uBR 10000 Series is a router device from Cisco. A security vulnerability exists in the Cisco uBR 10000 that allows unauthenticated remote attackers to conduct denial of service attacks. By operating the IPv4 and IPv6 address assignments of a dual-stack modem connected to the affected device, an attacker in a neighboring network can reload the router engine in the device. Successful exploits will cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCue15313. Successful exploitation of the vulnerability requires the program to use IPv4/IPv6 dual-track routers
VAR-201304-0137 CVE-2013-0133 Plesk Panel 11.0.9 privilege escalation vulnerabilities CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Untrusted search path vulnerability in /usr/local/psa/admin/sbin/wrapper in Parallels Plesk Panel 11.0.9 allows local users to gain privileges via a crafted PATH environment variable. Plesk Panel 11.0.9 and possibly earlier versions contains multiple privilege escalation vulnerabilities. Parallels Plesk Panel is a web hosting control panel with integrated web design, SaaS marketplace and payment system. The program / usr / local / psa / admin / sbin / wrapper allows the user psaadm to execute various management scripts with root permissions. These scripts do not specify the full path when calling external programs. By specifying a malicious PATH environment variable, an attacker can make these management The script executes malicious programs controlled by the attacker, leading to elevated privileges. Parallels Plesk Panel is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to execute arbitrary code with root privileges. Parallels Plesk Panel 11.0.9 is vulnerable; other versions may also be vulnerable