VARIoT IoT vulnerabilities database
| VAR-202110-0173 | CVE-2021-25493 | Samsung Notes libSPenBase Buffer Overflow Vulnerability (CNVD-2025-24720) |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read. Samsung Notes is an application developed by Samsung in South Korea. It provides a note-taking function
| VAR-202110-0174 | CVE-2021-25494 | Samsung Notes Buffer error vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution
| VAR-202110-0172 | CVE-2021-25492 | Samsung Notes Buffer error vulnerability |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read
| VAR-202110-0201 | CVE-2021-34711 | Cisco IP Phone Path traversal vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system
| VAR-202110-0188 | CVE-2021-25473 | Samsung SystemUI Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: 4.4 Severity: MEDIUM |
Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_hide_by_meadia_full value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset. Samsung SystemUI is a system application for Samsung mobile devices.
There is a denial of service vulnerability in Samsung SystemUI. The vulnerability originates from an incorrect handling of the multi_sim_bar_hide_by_meadia_full exception in SystemUI. Attackers can exploit this vulnerability to cause a denial of service before the device is restored to factory settings
| VAR-202110-0159 | CVE-2021-25479 | Samsung LTE RRC Buffer Overflow Vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution. Samsung LTE RRC is a protocol in Samsung mobile devices. The RRC word layer has many functions, including the broadcast of non-access stratum (NAS) related system information, the broadcast of access stratum (AS) related system information, and paging , establishing, maintaining and releasing the RRC connection between the UE and the E-UTRAN
| VAR-202110-0240 | CVE-2021-34702 | Cisco Identity Services Engine Security hole |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to improper enforcement of administrator privilege levels for low-value sensitive data. An attacker with read-only administrator access to the web-based management interface could exploit this vulnerability by browsing to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system
| VAR-202110-0075 | CVE-2021-20489 | BM Sterling File Gateway Cross-site request forgery vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 197790. Vendor exploits this vulnerability IBM X-Force ID: 197790 It is published as.Information may be obtained and information may be tampered with
| VAR-202110-0199 | CVE-2021-34706 | Cisco Identity Services Engine Code problem vulnerability |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the web application to perform arbitrary HTTP requests on behalf of the attacker
| VAR-202110-0073 | CVE-2021-20473 | IBM Sterling File Gateway Session deadline vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
IBM Sterling File Gateway User Interface 2.2.0.0 through 6.1.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 196944. Vendor exploits this vulnerability IBM X-Force ID: 196944 It is published as.Information may be obtained and information may be tampered with
| VAR-202110-0074 | CVE-2021-20481 | IBM Sterling File Gateway Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503. Vendor exploits this vulnerability IBM X-Force ID: 197503 It is published as.Information may be obtained and information may be tampered with
| VAR-202110-0093 | CVE-2021-1594 | Cisco Identity Services Engine Operating system command injection vulnerability |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes
| VAR-202110-0212 | CVE-2021-34766 | Cisco Smart Software Manager Security hole |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web UI of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and create, read, update, or delete records and settings in multiple functions. This vulnerability is due to insufficient authorization of the System User and System Operator role capabilities. An attacker could exploit this vulnerability by directly accessing a web resource. A successful exploit could allow the attacker to create, read, update, or delete records and settings in multiple functions without the necessary permissions on the web UI
| VAR-202110-0209 | CVE-2021-34748 | Cisco Intersight Operating system command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Intersight Virtual Appliance could allow an authenticated, remote attacker to perform a command injection attack on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using the web-based management interface to execute a command using crafted input. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on an affected device
| VAR-202110-0213 | CVE-2021-34772 | Cisco Orbital Input validation error vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites
| VAR-202110-0211 | CVE-2021-34758 | Cisco RoomOS Software and Cisco TelePresence Collaboration Endpoint Software Access control error vulnerability |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
A vulnerability in the memory management of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker to corrupt a shared memory segment, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient access controls to a shared memory resource. An attacker could exploit this vulnerability by corrupting a shared memory segment on an affected device. A successful exploit could allow the attacker to cause the device to reload. The device will recover from the corruption upon reboot
| VAR-202110-0207 | CVE-2021-34742 | Cisco Vision Dynamic Signage Director Cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information
| VAR-202110-0131 | CVE-2021-24019 | Fortinet FortiClientEms Code problem vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks). Fortinet FortiClientEms is a centralized central management system of Fortinet Corporation in the United States
| VAR-202110-0203 | CVE-2021-34782 | Cisco DNA Center Security hole |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the API endpoints for Cisco DNA Center could allow an authenticated, remote attacker to gain access to sensitive information that should be restricted. The attacker must have valid device credentials. This vulnerability is due to improper access controls on API endpoints. An attacker could exploit the vulnerability by sending a specific API request to an affected application. A successful exploit could allow the attacker to obtain sensitive information about other users who are configured with higher privileges on the application
| VAR-202110-0014 | CVE-2020-15941 | Fortinet FortiClientEms Path traversal vulnerability |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages