VARIoT IoT vulnerabilities database
| VAR-202111-0302 | CVE-2021-42754 | FortiClientMacOS Code injection vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.0 Severity: MEDIUM |
An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. FortiClientMacOS There is a code injection vulnerability in.Information may be tampered with. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances
| VAR-202111-0241 | CVE-2021-36172 | FortiPortal In XML External entity vulnerabilities |
CVSS V2: 6.4 CVSS V3: 8.1 Severity: HIGH |
An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents. FortiPortal for, XML There is a vulnerability in an external entity.Information is obtained and service operation is interrupted (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs
| VAR-202111-0232 | CVE-2021-26107 | FortiManager Vulnerability in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager. FortiManager Exists in unspecified vulnerabilities.Information may be tampered with. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management
| VAR-202111-0231 | CVE-2021-32595 | FortiPortal Resource exhaustion vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. FortiPortal Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs. There is a security vulnerability in versions of FortiPortal prior to 6.0.6
| VAR-202111-0204 | CVE-2020-12814 | Fortinet FortiAnalyzer Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiAnalyzer version 6.0.6 and below, version 6.4.4 allows attacker to execute unauthorized code or commands via specifically crafted requests to the web GUI. Fortinet FortiAnalyzer Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202111-0778 | CVE-2021-30265 | plural Qualcomm Out-of-bounds write vulnerabilities in the product |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0777 | CVE-2021-30266 | plural Qualcomm Product Use of Freed Memory Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0521 | CVE-2021-30284 | plural Qualcomm Vulnerability regarding information leakage in products |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
| VAR-202111-0611 | CVE-2021-1981 | plural Qualcomm Product out-of-bounds read vulnerability |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Possible buffer over read due to improper IE size check of Bearer capability IE in MT setup request from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile. plural Qualcomm The product contains an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
| VAR-202111-0609 | CVE-2021-1975 | plural Qualcomm Out-of-bounds write vulnerabilities in the product |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: HIGH |
Possible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0603 | CVE-2021-30254 | plural Qualcomm Product input verification vulnerabilities |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0602 | CVE-2021-30255 | plural Qualcomm Array index validation vulnerability in product |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Possible buffer overflow due to improper input validation in PDM DIAG command in FTM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an array index validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0517 | CVE-2021-30264 | plural Qualcomm Product Use of Freed Memory Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0608 | CVE-2021-1973 | plural Qualcomm Buffer error vulnerability in the product |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A FTM Diag command can allow an arbitrary write into modem OS space in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0579 | CVE-2021-1924 | plural Qualcomm Observable inconsistency vulnerabilities in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains an observable inconsistency vulnerability.Information may be obtained
| VAR-202110-1437 | CVE-2021-33259 | D-Link DIR-868LW Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history. D-Link DIR-868LW There is a vulnerability in the lack of authentication for critical features.Information may be obtained. D-Link DIR-868L is a wireless router made by D-Link in Taiwan.
D-Link DIR-868LW has a security vulnerability, which is caused by configuration errors in the network system or product during operation. Unauthorized attackers can use vulnerabilities to obtain sensitive information about affected components
| VAR-202110-1080 | CVE-2021-31627 | Tenda AC9 Classic buffer overflow vulnerability in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter. Tenda AC9 Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 is a wireless router from Tenda in China
| VAR-202110-1423 | CVE-2020-22079 | Tenda AC-10U AC1200 Out-of-Bounds Write Vulnerability in Router |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg. Tenda AC-10U AC1200 Routers contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC-10U is a wireless router of China Tenda (Tenda) company.
The Tenda AC-10U AC1200 router has a buffer overflow vulnerability. The vulnerability exists due to boundary errors when processing untrusted input
| VAR-202110-1440 | CVE-2021-31624 | Tenda AC9 Classic buffer overflow vulnerability in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter. Tenda AC9 Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC9 is a wireless router from the Chinese company Tenda
| VAR-202110-1695 | CVE-2021-41746 | Yonyou TurboCRM In SQL Injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information. Yonyou TurboCRM for, SQL There is an injection vulnerability.Information may be obtained