VARIoT IoT vulnerabilities database

VAR-202107-1819 | No CVE | Information disclosure vulnerability exists in Meizu 16s pro |
CVSS V2: 4.7 CVSS V3: - Severity: MEDIUM |
Meizu 16s pro is a smart phone produced by Zhuhai Meizu Technology Co., Ltd.
Meizu 16s pro has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-0021 | CVE-2020-12731 | Android for MagicMotion Flamingo 2 Vulnerability in plaintext storage of critical information in applications |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The MagicMotion Flamingo 2 application for Android stores data on an sdcard under com.vt.magicmotion/files/Pictures, whence it can be read by other applications. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China. Attackers can use this vulnerability to make it read by other applications
VAR-202107-1867 | No CVE | OnePlus 8T has an information disclosure vulnerability |
CVSS V2: 4.7 CVSS V3: - Severity: MEDIUM |
OnePlus 8T is a smart phone.
OnePlus8T has an information disclosure vulnerability. Attackers can use to obtain sensitive user information.
VAR-202107-0020 | CVE-2020-12730 | MagicMotion Flamingo 2 Vulnerability regarding lack of encryption of critical data in |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
MagicMotion Flamingo 2 lacks BLE encryption, enabling data sniffing and packet forgery. MagicMotion Flamingo 2 There is a vulnerability in the lack of encryption of critical data.Information may be obtained. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China. Attackers can use this vulnerability to sniff data and forge data packets
VAR-202107-1814 | No CVE | Finetree 5MP Network Camera has logic flaw vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
5MP Network Camera is a camera product.
Finetree 5MP Network Camera has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202107-0019 | CVE-2020-12729 | MagicMotion Flamingo information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
MagicMotion Flamingo 2 has a lack of access control for reading from device descriptors. MagicMotion Flamingo 2 There is a vulnerability related to information leakage.Information may be obtained. MagicMotion Flamingo is a wearable vibrator produced by MagicMotion company in China
VAR-202107-1809 | No CVE | Ruijie RG-UAC 6000-ISG video access security gateway has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
RG-UAC 6000-ISG series video surveillance security gateway is a video surveillance network security reinforcement product independently developed by Ruijie Networks.
The RG-UAC 6000-ISG video access security gateway has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202107-1813 | No CVE | Unauthorized access vulnerability exists in Finetree-5MP-Network-Camera |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Finetree-5MP-Network-Camera is a network camera.
Unauthorized access vulnerability exists in Finetree-5MP-Network-Camera. Attackers can use this vulnerability to obtain sensitive information.
VAR-202107-1808 | No CVE | Unauthorized access vulnerabilities in multiple Dell printers |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Dell is known for its production, design, and sales of home and office computers, but it is also involved in the high-end computer market, producing and selling servers, data storage equipment, and network equipment.
Many Dell printers have unauthorized access vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information and perform unauthorized operations.
VAR-202107-0573 | CVE-2021-21587 | Dell Wyse Management Suite Vulnerability regarding information leakage in |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
Dell Wyse Management Suite versions 3.2 and earlier contain a full path disclosure vulnerability. A local unauthenticated attacker could exploit this vulnerability in order to obtain the path of files and folders. The offering includes Wyse endpoint centralized management, asset tracking and automatic device discovery
VAR-202107-0572 | CVE-2021-21586 | Wyse Management Suite Past traversal vulnerability in |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Wyse Management Suite versions 3.2 and earlier contain an absolute path traversal vulnerability. A remote authenticated malicious user could exploit this vulnerability in order to read arbitrary files on the system
VAR-202107-1688 | No CVE | Ruijie Networks Co., Ltd. EG Easy Gateway has a file upload vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage.
Ruijie Networks Co., Ltd. EG Easy Gateway has a file upload vulnerability. Attackers can use this vulnerability to gain control of the server.
VAR-202107-1690 | No CVE | Guangzhou Tongjucheng Electronic Technology Co., Ltd. TGS-AGW gateway has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Guangzhou Tongjucheng Electronic Technology Co., Ltd. is a "TGS-AGW" series of security gateway products with independent intellectual property rights. It has stable performance and powerful functions. It has passed the authority certification of public information network security; products also include WIFI wireless products and switching networks Products, network security products, etc.
The TGS-AGW gateway of Guangzhou Tongjucheng Electronic Technology Co., Ltd. has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202107-1689 | No CVE | Bihaiwei L7 cloud router wireless operation version has a command execution vulnerability (CNVD-2021-41531) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Bihaiwei L7 Cloud Road Wireless Operation Edition is a dedicated network equipment customized for commercial wireless managers such as hotels, resorts, shopping malls and stations. The device has multiple functions such as routing, firewall, flow control, wireless AC controller, and WeChat authentication.
Bihaiwei L7 cloud router wireless operation version has command execution vulnerabilities. Attackers can use this vulnerability to execute arbitrary system commands on the device and obtain device permissions.
VAR-202107-1810 | No CVE | Ruijie Networks Co., Ltd. EG Easy Gateway has logic flaws and vulnerabilities |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage.
Ruijie Networks Co., Ltd. EG Easy Gateway has a logic flaw vulnerability. Attackers can use this vulnerability to delete arbitrary files on the server.
VAR-202107-0087 | CVE-2020-20231 | Mikrotik RouterOs Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOs through stable version 6.48.3 suffers from a memory corruption vulnerability in the /nova/bin/detnet process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality
VAR-202107-1202 | CVE-2021-35469 | plural Lexmark Vulnerabilities in unquoted search paths or elements in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Lexmark Printer Software G2, G3 and G4 Installation Packages have a local escalation of privilege vulnerability due to a registry entry that has an unquoted service path
VAR-202107-0371 | CVE-2021-22318 | Huawei HarmonyOS Code problem vulnerability |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service
VAR-202107-1411 | CVE-2021-34316 | JT2Go and Teamcenter Visualization Input confirmation vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The DL180CoolType.dll library in affected applications lacks proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13380). JT2Go and Teamcenter Visualization There is an input verification vulnerability and an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-13380 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files
VAR-202107-1379 | CVE-2021-34295 | JT2Go and Teamcenter Visualization Input confirmation vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Gif_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing GIF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13024). JT2Go and Teamcenter Visualization There is an input verification vulnerability and an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-13024 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of GIF files