VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202108-0285 CVE-2021-22421 HarmonyOS  Vulnerability in privilege management CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0282 CVE-2021-22418 HarmonyOS  Integer overflow vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0284 CVE-2021-22420 HarmonyOS  Vulnerability in externally controllable reference to another area resource in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0283 CVE-2021-22419 HarmonyOS  Vulnerability for inadequate validation of data reliability in CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state
VAR-202108-0280 CVE-2021-22416 HarmonyOS  Vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0281 CVE-2021-22417 HarmonyOS  Vulnerability in CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
VAR-202108-2491 No CVE Unauthorized access vulnerability exists in DocuPrint CM305 df CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
DocuPrint CM305 df is a printer. DocuPrint CM305 df has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2425 No CVE Lexmark MX511de has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Lexmark MX511de series is a printer product of Lexmark. Lexmark MX511de has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2427 No CVE Lexmark MX611dhe has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark MX611dhe is a printer product of Lexmark. Lexmark MX611dhe has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2332 No CVE SINDOH N600 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Xindu (Qingdao) Office System Co., Ltd. was established in 1960. It is a multinational company focusing on the production of office automation equipment based on digital networks. SINDOH N600 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2426 No CVE Lexmark-X792e has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark-X792e is a printer product of Lexmark. The Lexmark-X792e series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-0683 CVE-2021-3615 Lenovo Smart Camera Code injection vulnerability CVSS V2: 4.6
CVSS V3: 6.8
Severity: MEDIUM
A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow code execution if a specific file exists on the attached SD card. This vulnerability is the same as CNVD-2021-45262. Shenzhen Qiaoan Technology Co., Ltd., founded in Shenzhen in 2010, is a national high-tech enterprise with "Qiaoan" as the core brand, mainly engaged in the research and development, production, marketing and service of video security smart home products. Many cameras of Shenzhen Qiaoan Technology Co., Ltd. have command execution vulnerabilities. Attackers can use the vulnerabilities to gain control of the server
VAR-202108-2481 No CVE Lexmark CX410de has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark CX410de is a printer product of Lexmark. Lexmark CX410de has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2482 No CVE Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, Lexmark MX310dn have unauthorized access vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, Lexmark MX310dn are a printer product of Lexmark. Lexmark CS510de, Lexmark MS510dn, Lexmark MX510de, and Lexmark MX310dn have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2330 No CVE Shenzhen Chaohenghui Technology Co., Ltd. Leguang equipment management system has a SQL injection vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Leguang is the brand of wireless network products independently developed by Shenzhen Chaohenghui Network Technology Co., Ltd. The products cover: smart gateways, digital network bridges, smart wireless routers, POE switches, and so on. Shenzhen Chaohenghui Technology Co., Ltd. Leguang equipment management system has a SQL injection vulnerability, attackers can use the vulnerability to obtain sensitive database information.
VAR-202108-2480 No CVE Lexmark CS310dn has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark CS310dn is a printer product of Lexmark. Lexmark CS310dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2422 No CVE Unauthorized access vulnerability exists in Cisco IP Phone CP-9971 CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Systems (China) Network Technology Co., Ltd., business scope: research and development of computer network systems and communication systems; provide computer network systems and communication systems installation, technical consultation, etc. Cisco IP Phone CP-9971 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2428 No CVE Lexmark MS610dn has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark MS610dn is a printer product of Lexmark. Lexmark MS610dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2429 No CVE Lexmark CS410dn has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Lexmark CS410dn is a printer from Lexmark. Lexmark CS410dn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2219 CVE-2021-22381 Huawei  Vulnerability related to input confirmation on smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS