VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202111-0302 CVE-2021-42754 FortiClientMacOS  Code injection vulnerability in CVSS V2: 3.5
CVSS V3: 5.0
Severity: MEDIUM
An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. FortiClientMacOS There is a code injection vulnerability in.Information may be tampered with. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances
VAR-202111-0241 CVE-2021-36172 FortiPortal  In  XML  External entity vulnerabilities CVSS V2: 6.4
CVSS V3: 8.1
Severity: HIGH
An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents. FortiPortal for, XML There is a vulnerability in an external entity.Information is obtained and service operation is interrupted (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs
VAR-202111-0232 CVE-2021-26107 FortiManager  Vulnerability in CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager. FortiManager Exists in unspecified vulnerabilities.Information may be tampered with. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management
VAR-202111-0231 CVE-2021-32595 FortiPortal  Resource exhaustion vulnerability in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. FortiPortal Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs. There is a security vulnerability in versions of FortiPortal prior to 6.0.6
VAR-202111-0204 CVE-2020-12814 Fortinet FortiAnalyzer  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiAnalyzer version 6.0.6 and below, version 6.4.4 allows attacker to execute unauthorized code or commands via specifically crafted requests to the web GUI. Fortinet FortiAnalyzer Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202111-0778 CVE-2021-30265 plural  Qualcomm  Out-of-bounds write vulnerabilities in the product CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0777 CVE-2021-30266 plural  Qualcomm  Product Use of Freed Memory Vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0521 CVE-2021-30284 plural  Qualcomm  Vulnerability regarding information leakage in products CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202111-0611 CVE-2021-1981 plural  Qualcomm  Product out-of-bounds read vulnerability CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
Possible buffer over read due to improper IE size check of Bearer capability IE in MT setup request from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile. plural Qualcomm The product contains an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202111-0609 CVE-2021-1975 plural  Qualcomm  Out-of-bounds write vulnerabilities in the product CVSS V2: 10.0
CVSS V3: 9.8
Severity: HIGH
Possible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0603 CVE-2021-30254 plural  Qualcomm  Product input verification vulnerabilities CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0602 CVE-2021-30255 plural  Qualcomm  Array index validation vulnerability in product CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Possible buffer overflow due to improper input validation in PDM DIAG command in FTM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an array index validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0517 CVE-2021-30264 plural  Qualcomm  Product Use of Freed Memory Vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0608 CVE-2021-1973 plural  Qualcomm  Buffer error vulnerability in the product CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A FTM Diag command can allow an arbitrary write into modem OS space in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0579 CVE-2021-1924 plural  Qualcomm  Observable inconsistency vulnerabilities in products CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking. plural Qualcomm The product contains an observable inconsistency vulnerability.Information may be obtained
VAR-202110-1437 CVE-2021-33259 D-Link DIR-868LW  Vulnerability regarding lack of authentication for critical features in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history. D-Link DIR-868LW There is a vulnerability in the lack of authentication for critical features.Information may be obtained. D-Link DIR-868L is a wireless router made by D-Link in Taiwan. D-Link DIR-868LW has a security vulnerability, which is caused by configuration errors in the network system or product during operation. Unauthorized attackers can use vulnerabilities to obtain sensitive information about affected components
VAR-202110-1080 CVE-2021-31627 Tenda AC9  Classic buffer overflow vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter. Tenda AC9 Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 is a wireless router from Tenda in China
VAR-202110-1423 CVE-2020-22079 Tenda AC-10U AC1200  Out-of-Bounds Write Vulnerability in Router CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg. Tenda AC-10U AC1200 Routers contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC-10U is a wireless router of China Tenda (Tenda) company. The Tenda AC-10U AC1200 router has a buffer overflow vulnerability. The vulnerability exists due to boundary errors when processing untrusted input
VAR-202110-1440 CVE-2021-31624 Tenda AC9  Classic buffer overflow vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter. Tenda AC9 Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC9 is a wireless router from the Chinese company Tenda
VAR-202110-1695 CVE-2021-41746 Yonyou TurboCRM  In  SQL  Injection vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
SQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information. Yonyou TurboCRM for, SQL There is an injection vulnerability.Information may be obtained