VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202112-0062 CVE-2021-43772 Trend Micro Security Security feature vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
VAR-202112-0170 CVE-2021-20847 Co., Ltd. NTT Made by docomo  Wi-Fi STATION SH-52A  Cross-site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting vulnerability in Wi-Fi STATION SH-52A (38JP_1_11G, 38JP_1_11J, 38JP_1_11K, 38JP_1_11L, 38JP_1_26F, 38JP_1_26G, 38JP_1_26J, 38JP_2_03B, and 38JP_2_03C) allows a remote unauthenticated attacker to inject an arbitrary script via WebUI of the device. Co., Ltd. This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Yokohama National University Takayuki Sasaki MrOf the product WebUI Any script may be executed on the web browser of the user accessing
VAR-202111-1531 CVE-2020-7879 ipTIME C200 IP  in camera  OS  Command injection vulnerability CVSS V2: 6.8
CVSS V3: 9.8
Severity: CRITICAL
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command. ipTIME C200 IP The camera has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-1526 CVE-2021-39000 IBM MQ Information disclosure vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.
VAR-202111-1528 CVE-2021-38967 IBM MQ Appliance  Code injection vulnerability in CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441. IBM MQ Appliance There is a code injection vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 212441 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. IBM MQ Appliance is an all-in-one device from IBM of the United States for rapid deployment of enterprise-level messaging middleware. No detailed vulnerability details are currently provided
VAR-202112-0015 CVE-2021-32592 Windows  for  FortiClient  and  FortiClientEMS  Vulnerability regarding uncontrolled search path elements in CVSS V2: 6.9
CVSS V3: 7.8
Severity: HIGH
An unsafe search path vulnerability in FortiClientWindows 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x and FortiClientEMS 7.0.0, 6.4.6 and below, 6.2.x, 6.0.x may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path. Windows for FortiClient and FortiClientEMS Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. FortiClient is a set of mobile terminal security solutions from Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. An escalation of privilege vulnerability exists in FortiClient, which is caused by the application loading DLL libraries in an unsafe manner
VAR-202111-1472 CVE-2021-38958 IBM MQ Appliance  Vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042. IBM MQ Appliance There is an unspecified vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 212042 It is published as.Service operation interruption (DoS) It may be in a state. IBM MQ Appliance is an all-in-one device from IBM of the United States for rapid deployment of enterprise-level messaging middleware. No detailed vulnerability details are currently provided
VAR-202111-1527 CVE-2021-38999 IBM MQ Appliance  Vulnerability regarding information leakage in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace. IBM MQ Appliance is an all-in-one device from IBM of the United States for rapid deployment of enterprise-level messaging middleware
VAR-202111-0913 CVE-2021-26611 HejHome GKW-IC052 IP Camera  Vulnerability in using hard-coded credentials in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnerability. This issue allows remote attackers to operate the IP Camera.(reboot, factory reset, snapshot etc..). (DoS) It may be in a state
VAR-202111-1479 CVE-2021-39995 eCNS280_TD  and  eSE620X vESS  Out-of-bounds read vulnerability in CVSS V2: 6.8
CVSS V3: 6.5
Severity: MEDIUM
Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. eCNS280_TD and eSE620X vESS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei ESE620X vESS is a virtual enterprise service controller. eCNS280_TD is the core network equipment of the wireless broadband trunking system
VAR-202111-1496 CVE-2021-43268 Wind River VxWorks Resource Management Error Vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
An issue was discovered in VxWorks 6.9 through 7. In the IKE component, a specifically crafted packet may lead to reading beyond the end of a buffer, or a double free. VxWorks contains a double free vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Wind River VxWorks is an operating system of Wind River Company of the United States. The industry-leading real-time operating system for building embedded devices and systems. No detailed vulnerability details are currently provided
VAR-202111-0965 CVE-2021-42783 D-Link DWR-932C E1  Vulnerability related to lack of authentication for critical functions in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Missing Authentication for Critical Function vulnerability in debug_post_set.cgi of D-Link DWR-932C E1 firmware allows an unauthenticated attacker to execute administrative actions. (DoS) It may be in a state. D-Link Dwr-932C E1 is a WiFi mobile modem router from China's D-Link company. The D-Link DWR-932C E1 firmware has a security vulnerability. The vulnerability stems from the lack of key function certification in post set.cgi. Attackers can use this vulnerability to perform management operations
VAR-202111-0964 CVE-2021-42784 D-Link DWR-932C E1  in the firmware  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request. (DoS) It may be in a state. D-Link Dwr-932C E1 is a WiFi mobile modem router from China's D-Link company
VAR-202111-1722 CVE-2021-21926 Advantech R-SeeNet SQL Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘health_filter’ parameter
VAR-202111-1592 CVE-2021-37030 Huawei  Improper Default Permission Vulnerability in Smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones are vulnerable to improper default permissions.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. An incorrect permission vulnerability exists in Huawei Emui and Magic UI
VAR-202111-1591 CVE-2021-37032 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are bypass vulnerabilities in Huawei Emui and Magic UI
VAR-202111-1590 CVE-2021-37034 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have information disclosure vulnerabilities
VAR-202111-1586 CVE-2021-37029 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Authentication vulnerabilities exist in Huawei Emui and Magic UI
VAR-202111-1585 CVE-2021-37031 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI
VAR-202111-1584 CVE-2021-37033 Huawei  Injection Vulnerability in Smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have an injection vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have injection attack vulnerabilities