VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-200312-0193 CVE-2003-1091 Apple QuickTime/Darwin Streaming Server integer overflow in MP3Broadcaster utility CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Integer overflow in MP3Broadcaster for Apple QuickTime/Darwin Streaming Server 4.1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed ID3 tags in MP3 files. Apple's QuickTime and Darwin Streaming Server (DSS) package includes a utility called MP3Broadcaster. This utility contains an integer overflow which may be exploited to cause a denial of service. MP3Broadcaster has been reported prone to a vulnerability when processing malicious ID3 tags. This is likely due to insufficient sanity checks performed when handling signed integer values contained within MP3 file ID3 tags. MP3Broadcaster is an MP3 broadcasting program included in the Darwin streaming service program. MP3Broadcaster does not correctly process the ID3 tag. Remote attackers can use this vulnerability to construct malicious MP3 files, trigger integer-based buffer overflows, and perform denial-of-service attacks on service programs. Malicious MP3 files can cause MP3Broadcaster to segfault
VAR-200305-0089 No CVE Cisco IOS Service Assurance Agent Malformed Packet Denial Of Service Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
It has been reported that Cisco IOS is vulnerable to an issue in handling Service Assurance Agent (previously called Response Time Reporter, or RTR) packets. Because of this, a remote user may be able to cause the router to become unstable and crash.
VAR-200305-0083 No CVE Cisco IOS Crypto Engine Accelerator Access Control List Bypass Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Internet Operating System (IOS) is an operating system used on CISCO routers. The use of an access control list when the CISCO router enables the crypto engine accelerator allows unauthorized types of communication access, which can be exploited by remote attackers to bypass the access control list to access the protected network. If the CISCO router has the following configuration: crypto engine accelerator PPPoE dialer Ip route-cache Set the access control list on the external interface to allow only incoming ISAKMP and IPSEC communication, such as: ip access-list extended Block-Inbound-unwanted-Trafic permit udp 100.100. 100.0 0.0.0.255 host 102.168.1.2 eq isakmp permit esp 100.100. 100.0 0.0.0.255 host 102.168.1.2 deny ip any any log The IPSec communication will be parsed twice due to the incoming access control list, which will result in unauthorized communication access being protected. The internet. For example, ACLs allow internal networks to be exploited by attackers to inject fake packets into the network. However, if static encryption (crypto) mapping is used, this problem does not exist, so non-encrypted communication will be discarded when it is parsed by the ACL. In the case of dynamic encryption mapping, if an attacker wants to note that a forged packet bypasses the access list to access the network, it must control the neighbor router connected to the ACK interface to complete the attack
VAR-200505-1007 CVE-2005-1027 PHP-Nuke Your_Account Cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.x through 7.6 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter in the Your_Account module, (2) avatarcategory parameter in the Your_Account module, or (3) lid parameter in the Downloads module. It is reported that the PHP-Nuke 'Your_Account' module is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input. This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials. This vulnerability is reported to affect PHP-Nuke version 7.6 and previous versions
VAR-200312-0469 CVE-2003-1468 PHP-Nuke Web_Links Module path leak vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The Web_Links module in PHP-Nuke 6.0 through 6.5 final allows remote attackers to obtain the full web server path via an invalid cid parameter that is non-numeric or null, which leaks the pathname in an error message. The Web_Links module for PHP-Nuke has been reported prone to a vulnerability which, when exploited, may disclose sensitive path information to a remote attacker. An attacker may use the information gathered in this manner to mount further attacks against the host. It should be noted that although PHP-Nuke version 6.x has been reported vulnerable, other versions might also be affected. There is a vulnerability in the Web_Links module of PHP-Nuke versions 6.0 to 6.5 Ultimate
VAR-200312-0158 CVE-2003-1210 PHP-Nuke Multiple Downloads Component SQL Injection vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Multiple SQL injection vulnerabilities in the Downloads module for PHP-Nuke 5.x through 6.5 allow remote attackers to execute arbitrary SQL commands via the (1) lid parameter to the getit function or the (2) min parameter to the search function. Exploitation could allow for injection of malicious SQL syntax, resulting in modification of SQL query logic or other attacks
VAR-200306-0002 CVE-2003-0270 Apple AirPort administrator password encryption vulnerability CVSS V2: 7.6
CVSS V3: -
Severity: HIGH
The administration capability for Apple AirPort 802.11 wireless access point devices uses weak encryption (XOR with a fixed key) for protecting authentication credentials, which could allow remote attackers to obtain administrative access via sniffing when the capability is available via Ethernet or non-WEP connections. The Apple AirPort device is a wireless access point that provides 802.11 services to network clients. This device can be managed via TCP 5009 port through the management protocol.  The password encryption mechanism used in the management and verification process of Apple AirPort devices is too simple. Remote attackers can use this vulnerability to sniff the network and obtain password information.  AirPort devices use authentication passwords with a maximum length of 32 characters and perform XOR operations on predefined keys. When the password is transmitted to the network, the password is fixed to 32 bytes and sent. @stake used a single character as the password for the experiment. By observing the exchange of network packets, he found a 31-byte key for XOR operation. The last byte of the cipher text is the first word that has been encrypted The first byte of the ciphertext and plaintext password is XORed.  If AirPort can connect via the Ethernet interface or through an insecure wireless connection (without WEP), anonymous attackers can sniff the network to gain administrator access to the device. The problem lies in the administrative password being encoded using a simple XOR key. An attacker capable of intercepting authentication-based network traffic may trivially reverse the cipher, resulting in administrative access to the device
VAR-200306-0007 CVE-2003-0279 PHP-Nuke Web_Links Module remote SQL Injection code vulnerability CVSS V2: 2.6
CVSS V3: -
Severity: LOW
Multiple SQL injection vulnerabilities in the Web_Links module for PHP-Nuke 5.x through 6.5 allows remote attackers to steal sensitive information via numeric fields, as demonstrated using (1) the viewlink function and cid parameter, or (2) index.php. PHP-Nuke is reportedly prone to multiple SQL injection vulnerabilities in the Downloads module. Exploitation could allow for injection of malicious SQL syntax, resulting in modification of SQL query logic or other attacks. It has been reported that multiple input validation bugs exist in the Web_Links module used by PHPNuke. Because of this, a remote user may be able to access the database and potentially gain access to sensitive information. Successful exploitation could result in compromise of the web forums or more severe consequences. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. If the SQL agent allows users to use the UNION syntax, it is possible to expand any information inside the database through the Web_Links module, including passwords and personal data, but if the UNION syntax cannot be used, the attacker cannot access other SQL tables managed through WEB LINK, so Only some click-through rate and voting information can be obtained
VAR-200306-0053 CVE-2003-0370 KDE Konqueror In SSL Unchecked vulnerability for certificates CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack. KDE Included file manager or Web Used as a browser Konqueror Is SSL Due to incomplete implementation of SSL The check against the certificate is not the host name IP User forged because it is done with an address SSL A vulnerability exists that accepts a certificate without realizing it is a certificate.SSL Untrusted through malicious Web May connect to site. The browser fails to detect cases where the CN doesn't match the hostname of the server. This could lead to a variety of attacks, including the possibility of allowing a malicious server to masquerade as a trusted server. The non-embedded Konqueror distribution is reportedly not affected by this issue
VAR-200312-0465 CVE-2003-1464 Siemens Mobile Phones% IMG_NAME Remote Denial of Service Attack Vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Buffer overflow in Siemens 45 series mobile phones allows remote attackers to cause a denial of service (disconnect and unavailable inbox) via a Short Message Service (SMS) message with a long image name. There are vulnerabilities in Siemens 45 series phones. This is reportedly due to a boundary condition error that occurs when an overly large image name is included in a SMS message
VAR-200305-0033 CVE-2003-0216 Cisco Catalyst switches allow access to "enable mode" without password CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password. Cisco Catalyst version 7.5(1) has an unknown vulnerability
VAR-200312-0483 CVE-2003-1482 Microsoft MN-500 Clear text password disclosure vulnerability CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
The backup configuration file for Microsoft MN-500 wireless base station stores administrative passwords in plaintext, which allows local users to gain access. A weakness has been reported for the MN-500 device that may result in the disclosure of administrative credentials to remote attackers. Microsoft MN-500 is a wireless access device that supports 802.11B wireless network. According to the report, the problem is that the backup configuration file stores the administrator password in clear text, and the attacker can control the entire device by querying the backup file to obtain authentication information
VAR-200305-0082 No CVE Cisco Optical Transport Platform illegal telnet request remote denial of service vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Cisco ONS 15454, ONS 15327, ONS 15454 SDH, and ONS 15600 hardware are managed by TCC+, XTC, TCCi, and TSC control cards, which are typically used in internal customer environments to connect to the external Internet. The telnet service of the Cisco Optical Transport Platform system handles illegal requests incorrectly. A remote attacker can exploit this vulnerability to perform a denial of service attack on the device, which can cause network interruption. By submitting an illegal telnet request, an attacker can cause a TCC+, XTC, TCCi, and TSC control card to be reset. Repeating an illegal request can cause the device to interrupt normal communication and generate a denial of service. This vulnerability was reproduced by the Nessus scanner, CISCO BUG number: CSCdz83519
VAR-200305-0063 CVE-2003-0190 OpenSSH  of  PAM  Vulnerability to timing attack in authentication CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. Portable Edition OpenSSH If this setting is PAM If enabled in conjunction with an implementation of OpenSSH When authentication fails, the authentication result is determined depending on the existing username and non-existing username. "Permission denied, please try again." There is a vulnerability where there is a difference in the time it takes to return the .It may be possible to guess whether the username exists or not. The portable version of OpenSSH is reported prone to an information-disclosure vulnerability. The portable version is distributed for operating systems other than its native OpenBSD platform. This issue is related to BID 7467. Reportedly, the previous fix for BID 7467 didn't completely fix the issue. This current issue may involve differing code paths in PAM, resulting in a new vulnerability, but this has not been confirmed. Exploiting this vulnerability allows remote attackers to test for the presence of valid usernames. Knowledge of usernames may aid them in further attacks
VAR-200305-0035 CVE-2003-0219 Kerio Personal Firewall Replay Attack Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute administrator commands by sniffing packets from a valid session and replaying them against the remote administration server
VAR-200305-0036 CVE-2003-0220 Kerio Personal Firewall vulnerable to buffer overflow CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet. An exploit for this vulnerability is publicly available. A buffer-overflow vulnerability has been discovered in Kerio Personal Firewall. The problem occurs during the administration authentication process. An attacker could exploit this vulnerability by forging a malicious packet containing an excessive data size. The application then reads this data into a static memory buffer without first performing sufficient bounds checking. Note that this vulnerability affects Kerio Personal Firewall 2.1.4 and earlier. When the administrator connects to the firewall, a handshake connection will be performed to establish an encrypted session. The fourth packet of the handshake (the first packet is sent by the administrator) contains 4 bytes of data, which has a certain fixed value 0x40 (64) to indicate the follow-up The size of the package containing the admin key. When the firewall side uses recv() to process this data, it does not check the boundary buffer
VAR-200312-0440 CVE-2003-1491 Kerio Personal Firewall Firewall Filter Bypass Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53. Reportedly, KPF suffers from a vulnerability whereby the existing firewall filters may be bypassed. This vulnerability exists due to the fact that UDP traffic to and from port 53 is allowed. Allegedly, an attacker may craft a special packet with a source port of 53 and send this packet to a vulnerable system. KPF will allow this packet to proceed thus bypassing the firewall filters
VAR-200312-0439 CVE-2003-1490 SonicWALL Pro HTTP POST Remote denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
SonicWall Pro running firmware 6.4.0.1 allows remote attackers to cause a denial of service (device reset) via a long HTTP POST to the internal interface, possibly due to a buffer overflow. The firewall device will reset, resulting in a loss of availability while it goes through this cycle. This may be the result of a buffer being overrun, however, this has not been confirmed. SonicWALL PRO is a full-featured Internet security appliance designed specifically for large networks with ever-growing VPN needs
VAR-200304-0180 No CVE Cisco Catalyst CatOS Authentication Bypass Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
A vulnerability has been reported for Cisco Catalyst switches that may result in unauthorized access to the enable level. The vulnerability exists due to the way the 'enable' mode is accessed through the switch. An attacker who is able to obtain command line access to a vulnerable switch is able to access 'enable' mode without a password.
VAR-200304-0141 No CVE HP JetDirect Printer FTP Service File Print Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The HP JetDirect printer is a printer with integrated network capabilities developed by Hewlett-Packard. The FTP directory in the HP JetDirect printer is writable, and a remote attacker can exploit this vulnerability to perform a denial of service attack on the print service. Since the HP JetDirect printer's directory permissions for its FTP service are not set correctly, any files sent to the Jetdirect FTP service can be printed, and an attacker can send a large number of requests for a denial of service attack. It has been reported that HP JetDirect Printers accept documents from any source without access control limitations. This could lead to a denial of service or abuse of printing services