VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202111-0420 CVE-2021-34731 Cisco Prime Access Registrar  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability
VAR-202111-0418 CVE-2021-34774 Cisco Common Services Platform Collector  Vulnerability regarding information leakage in CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to a specific API request. An attacker could exploit the vulnerability by sending a crafted HTTP request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the users of the application, including security questions and answers. To exploit this vulnerability an attacker would need valid Administrator credentials. Cisco expects to release software updates that address this vulnerability
VAR-202111-0402 CVE-2021-1500 Cisco Webex Video Mesh  Open redirect vulnerability in CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites. Cisco Webex Video Mesh Exists in an open redirect vulnerability.Information may be obtained and information may be tampered with
VAR-202111-0401 CVE-2021-40115 Cisco Webex Video Mesh  Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information
VAR-202111-0393 CVE-2021-40126 Cisco Umbrella  Vulnerability regarding information leakage due to error messages in CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system. Cisco Umbrella Contains a vulnerability related to information leakage due to error messages.Information may be obtained
VAR-202111-0284 CVE-2021-36192 FortiManager  Vulnerability regarding information leakage in CVSS V2: 2.1
CVSS V3: 3.8
Severity: LOW
An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 may allow a FortiGate user to see scripts from other ADOMS. FortiManager There is a vulnerability related to information leakage.Information may be obtained
VAR-202111-1790 CVE-2021-1042 Android  Kernel Use of Freed Memory Vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
In dsi_panel_debugfs_read_cmdset of dsi_panel.c, there is a possible disclosure of freed kernel heap memory due to a use after free. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187851056References: N/A. Google Android is a set of Linux-based open source operating system of the United States Google (Google). Android Pixel has security vulnerabilities, and no detailed vulnerability details are currently provided
VAR-202111-1789 CVE-2021-1045 Android  Kernel Resource Leakage Vulnerability to Wrong Region CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-195580473References: N/A. Android kernel contains a resource disclosure vulnerability to the wrong region. Google Pixel is a smart phone of the American company Google (Google). Android Pixel has security vulnerabilities, and no detailed vulnerability details are currently provided
VAR-202111-1791 CVE-2021-1043 Android  vulnerabilities in the kernel of CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
In TBD of TBD, there is a possible downgrade attack due to under utilized anti-rollback protections. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194697257References: N/A. Android kernel contains an unspecified vulnerability. Google Pixel is a smart phone of the American company Google (Google). Android Pixel has security vulnerabilities, and no detailed vulnerability details are currently provided
VAR-202111-0307 CVE-2021-36184 Fortinet FortiWLM  In  SQL  Injection vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A improper neutralization of Special Elements used in an SQL Command ('SQL Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests. Fortinet FortiWLM for, SQL There is an injection vulnerability.Information may be obtained. Fortinet FortiWLC is a wireless LAN controller from Fortinet
VAR-202111-0242 CVE-2020-15940 FortiClientEMS  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server. FortiClientEMS Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202111-1788 CVE-2021-1041 Android  kernel out-of-bounds read vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
In (TBD) of (TBD), there is a possible out of bounds read due to memory corruption. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182950799References: N/A. Android kernel contains an out-of-bounds read vulnerability. Google Pixel is a smart phone of the American company Google (Google). Android Pixel has security vulnerabilities. No detailed vulnerability details are currently provided
VAR-202111-0313 CVE-2021-36185 Fortinet FortiWLM  In  OS  Command injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A improper neutralization of special elements used in an OS command ('OS Command Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. Fortinet FortiWLM for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWLC is a wireless LAN controller from Fortinet
VAR-202111-0343 CVE-2021-36183 Windows  for  FortiClient  Vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates. Windows for FortiClient Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiClientWindows is a Windows-based mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances
VAR-202111-0330 CVE-2021-36176 FortiPortal  Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. FortiPortal Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs
VAR-202111-0322 CVE-2021-41019 FortiOS  Certificate validation vulnerabilities in CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
An improper validation of certificate with host mismatch [CWE-297] vulnerability in FortiOS versions 6.4.6 and below may allow the connection to a malicious LDAP server via options in GUI, leading to disclosure of sensitive information, such as AD credentials. FortiOS Exists in a certificate validation vulnerability.Information may be obtained. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam
VAR-202111-0317 CVE-2021-36181 FortiPortal  Race condition vulnerabilities in CVSS V2: 3.5
CVSS V3: 3.1
Severity: LOW
A concurrent execution using shared resource with improper Synchronization vulnerability ('Race Condition') in the customer database interface of FortiPortal before 6.0.6 may allow an authenticated, low-privilege user to bring the underlying database data into an inconsistent state via specific coordination of web requests. FortiPortal There is a race condition vulnerability in.Information may be tampered with. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs
VAR-202111-0314 CVE-2021-36174 FortiPortal  Vulnerability in resource allocation without restrictions or throttling in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A memory allocation with excessive size value vulnerability in the license verification function of FortiPortal before 6.0.6 may allow an attacker to perform a denial of service attack via specially crafted license blobs. FortiPortal Exists in a vulnerability in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs
VAR-202111-0306 CVE-2021-36186 Fortinet FortiWeb  Out-of-bounds write vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. Fortinet FortiWeb Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content
VAR-202111-0305 CVE-2021-36187 Fortinet FortiWeb  Resource exhaustion vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to cause a denial of service for webserver daemon via crafted HTTP requests. Fortinet FortiWeb Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content