VARIoT IoT vulnerabilities database

VAR-202108-0285 | CVE-2021-22421 | HarmonyOS Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0282 | CVE-2021-22418 | HarmonyOS Integer overflow vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0284 | CVE-2021-22420 | HarmonyOS Vulnerability in externally controllable reference to another area resource in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0283 | CVE-2021-22419 | HarmonyOS Vulnerability for inadequate validation of data reliability in |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state
VAR-202108-0280 | CVE-2021-22416 | HarmonyOS Vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0281 | CVE-2021-22417 | HarmonyOS Vulnerability in |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
VAR-202108-2491 | No CVE | Unauthorized access vulnerability exists in DocuPrint CM305 df |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
DocuPrint CM305 df is a printer.
DocuPrint CM305 df has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2425 | No CVE | Lexmark MX511de has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Lexmark MX511de series is a printer product of Lexmark.
Lexmark MX511de has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2427 | No CVE | Lexmark MX611dhe has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark MX611dhe is a printer product of Lexmark.
Lexmark MX611dhe has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2332 | No CVE | SINDOH N600 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Xindu (Qingdao) Office System Co., Ltd. was established in 1960. It is a multinational company focusing on the production of office automation equipment based on digital networks.
SINDOH N600 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2426 | No CVE | Lexmark-X792e has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark-X792e is a printer product of Lexmark.
The Lexmark-X792e series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-0683 | CVE-2021-3615 | Lenovo Smart Camera Code injection vulnerability |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow code execution if a specific file exists on the attached SD card. This vulnerability is the same as CNVD-2021-45262. Shenzhen Qiaoan Technology Co., Ltd., founded in Shenzhen in 2010, is a national high-tech enterprise with "Qiaoan" as the core brand, mainly engaged in the research and development, production, marketing and service of video security smart home products.
Many cameras of Shenzhen Qiaoan Technology Co., Ltd. have command execution vulnerabilities. Attackers can use the vulnerabilities to gain control of the server
VAR-202108-2481 | No CVE | Lexmark CX410de has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark CX410de is a printer product of Lexmark.
Lexmark CX410de has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2482 | No CVE | Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, Lexmark MX310dn have unauthorized access vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, Lexmark MX310dn are a printer product of Lexmark.
Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, and Lexmark MX310dn have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2330 | No CVE | Shenzhen Chaohenghui Technology Co., Ltd. Leguang equipment management system has a SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Leguang is the brand of wireless network products independently developed by Shenzhen Chaohenghui Network Technology Co., Ltd. The products cover: smart gateways, digital network bridges, smart wireless routers, POE switches, and so on.
Shenzhen Chaohenghui Technology Co., Ltd. Leguang equipment management system has a SQL injection vulnerability, attackers can use the vulnerability to obtain sensitive database information.
VAR-202108-2480 | No CVE | Lexmark CS310dn has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark CS310dn is a printer product of Lexmark.
Lexmark CS310dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2422 | No CVE | Unauthorized access vulnerability exists in Cisco IP Phone CP-9971 |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Systems (China) Network Technology Co., Ltd., business scope: research and development of computer network systems and communication systems; provide computer network systems and communication systems installation, technical consultation, etc.
Cisco IP Phone CP-9971 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2428 | No CVE | Lexmark MS610dn has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark MS610dn is a printer product of Lexmark.
Lexmark MS610dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2429 | No CVE | Lexmark CS410dn has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Lexmark CS410dn is a printer from Lexmark.
Lexmark CS410dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2219 | CVE-2021-22381 | Huawei Vulnerability related to input confirmation on smartphones |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS