VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202111-0870 CVE-2021-37025 Huawei  Input validation vulnerability in smartphones CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
VAR-202111-0853 CVE-2021-37007 Huawei  Out-of-Bounds Read Vulnerability in Smartphones CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
VAR-202111-0852 CVE-2021-37008 Huawei  Input validation vulnerability in smartphones CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
VAR-202111-0851 CVE-2021-37009 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
VAR-202111-0850 CVE-2021-37010 Huawei  Information disclosure vulnerability in smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
VAR-202111-0849 CVE-2021-37012 Huawei  Vulnerabilities in smartphones CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
VAR-202111-0848 CVE-2021-37013 Huawei  Input validation vulnerability in smartphones CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
VAR-202111-0847 CVE-2021-37015 Huawei  Out-of-Bounds Read Vulnerability in Smartphones CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202111-0846 CVE-2021-37016 Huawei  Out-of-Bounds Read Vulnerability in Smartphones CVSS V2: 8.5
CVSS V3: 9.1
Severity: CRITICAL
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
VAR-202111-1858 No CVE Shenzhen Anjia Vision Information Technology Co., Ltd. smart camera has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Anjoy Vision Information Technology Co., Ltd. (hereinafter referred to as: Anjoy Vision Information Technology Co., Ltd.) is a high-tech enterprise integrating R&D, production, sales and service. Shenzhen Anjia Vision Information Technology Co., Ltd. smart camera has a weak password vulnerability. Attackers can use the vulnerability to log in to the background to obtain sensitive information.
VAR-202111-1282 CVE-2021-43557 Apache APISIX command injection vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin. Apache APISIX Contains a command injection vulnerability.Information may be obtained. Apache Apisix is a cloud-native microservice API gateway service of the Apache Foundation in the United States. The software is implemented based on OpenResty and etcd, with dynamic routing and plug-in hot loading, suitable for API management under the microservice system. Apache APISIX has a security vulnerability, which stems from improper design or implementation issues in the code development process of network systems or products. No detailed vulnerability details are currently provided
VAR-202111-1762 CVE-2021-21928 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery
VAR-202111-1761 CVE-2021-21927 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter
VAR-202111-1760 CVE-2021-21925 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘firm_filter’ parameter
VAR-202111-1759 CVE-2021-21924 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘desc_filter’ parameter
VAR-202111-1758 CVE-2021-21917 Advantech R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-1757 CVE-2021-21916 Advantech R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-1752 CVE-2021-21919 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack
VAR-202111-1756 CVE-2021-21915 Advantech R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Advantech R-SeeNet for, SQL There is an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-1751 CVE-2021-21918 R-SeeNet  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack