VARIoT IoT vulnerabilities database
| VAR-202108-1362 | CVE-2021-39376 | Philips Healthcare Tasy Electronic Medical Record In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-0768 | CVE-2021-20090 | Arcadyan-based routers and modems vulnerable to authentication bypass |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. A path traversal vulnerability exists in numerous routers manufactured by multiple vendors using Arcadyan based software. This vulnerability allows an unauthenticated user access to sensitive information and allows for the alteration of the router configuration.CVE-2021-20090 AffectedCVE-2021-20090 Affected. Arcadyan Directory traversal vulnerabilities in many routers that use software CWE-22 , CVE-2021-20090 ) Exists.A remote third party may evade authentication and view sensitive information, including valid access tokens. As a result, the router settings can be tampered with. Buffalo WSR-2533DHPL2 and WSR-2533DHP3 are routers of Japan Buffalo Company.
Buffalo WSR-2533DHPL2 and WSR-2533DHP3 have path traversal vulnerabilities. The vulnerabilities are caused by input validation errors when processing the directory traversal sequence in the web interface. Attackers can use the vulnerabilities to bypass authentication. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1051 | CVE-2021-31401 | NicheStack embedded TCP/IP has vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet. HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2. HCC Embedded InterNiche is a newsletter software.
The HCC Embedded InterNiche stack has an input verification error vulnerability. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens Security Advisory
| VAR-202108-0329 | CVE-2021-1610 | Cisco Small Business RV340 and Cisco Small Business command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Multiple vulnerabilities in the web-based management interface of the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an attacker to do the following: Execute arbitrary code Cause a denial of service (DoS) condition Execute arbitrary commands For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be in a state. Cisco Small Business RV340 and Cisco Small Business are both products of Cisco (Cisco). Cisco Small Business RV340 is a router. A hardware device that connects two or more networks and acts as a gateway between the networks. Cisco Small Business is a switch.
Cisco Small Business RV340 and Cisco Small Business have command injection vulnerabilities. The vulnerability stems from the program's failure to properly verify the HTTP request. Remote attackers without authentication can use this vulnerability to execute arbitrary commands through specially crafted HTTP requests. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-0575 | CVE-2021-24014 | Pillow Buffer error vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202106-0973 | CVE-2021-27577 | Apache Traffic Server Environmental Issues Vulnerability (CNVD-2021-70101) |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. Apache Traffic Server (ATS) is a set of scalable HTTP proxy and cache servers of the Apache Foundation in the United States. An attacker can use this vulnerability to affect the cache of the target service. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4957-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 13, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : trafficserver
CVE ID : CVE-2021-27577 CVE-2021-32566 CVE-2021-32567
CVE-2021-35474 CVE-2021-32565
Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in denial of
service, HTTP request smuggling or cache poisoning.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u5.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=4fML
-----END PGP SIGNATURE-----
| VAR-202108-0568 | CVE-2021-1522 | Pillow Buffer error vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the change password API of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, remote attacker to alter their own password to a value that does not comply with the strong authentication requirements that are configured on an affected device. This vulnerability exists because a password policy check is incomplete at the time a password is changed at server side using the API. An attacker could exploit this vulnerability by sending a specially crafted API request to the affected device. A successful exploit could allow the attacker to change their own password to a value that does not comply with the configured strong authentication requirements. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Connected Mobile Experiences is an interconnected mobile experience of Cisco (Cisco)
| VAR-202106-1408 | CVE-2021-23848 | Bosch IP Cross-site scripting vulnerability in camera |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An error in the URL handler Bosch IP cameras may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the camera address can send a crafted link to a user, which will execute javascript code in the context of the user. Bosch IP There is a cross-site scripting vulnerability in the camera.Information may be obtained and information may be tampered with. Bosch IP cameras is a German network camera equipment. Attackers can use this vulnerability to inject malicious scripts or HTML code. When malicious data is viewed, they can obtain sensitive information or hijack user sessions. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-0193 | CVE-2020-28593 | Amazon Cosori Smart code execution vulnerability |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
A unauthenticated backdoor exists in the configuration server functionality of Cosori Smart 5.8-Quart Air Fryer CS158-AF 1.1.0. A specially crafted JSON object can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. amazon COSORI Smart is a hardware device of amazon company. Smart WiFi air fryer.
Cosori Smart 5.8-Quart has a security vulnerability that can be exploited by attackers to gain full access to the application and compromise the affected system. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-1025 | CVE-2021-27599 | SAP NetWeaver ABAP Server and ABAP Platform Information Disclosure Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Integration Builder Framework), versions - 7.10, 7.30, 7.31, 7.40, 7.50, allows an attacker to access information under certain conditions, which would otherwise be restricted
| VAR-202104-1030 | CVE-2021-27604 | SAP NetWeaver ABAP Server and ABAP Platform In XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
In order to prevent XML External Entity vulnerability in SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versions - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recommends to refer this note
| VAR-202104-1555 | CVE-2021-23279 | Eaton Intelligent Power Manager Arbitrary File Deletion Vulnerability |
CVSS V2: 6.4 CVSS V3: 10.0 Severity: CRITICAL |
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed. Eaton Intelligent Power Manager (IPM) is an intelligent power manager from Eaton, USA. It supports remote monitoring and management of multiple devices in the network from the interface. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-1553 | CVE-2021-23277 | Eaton Intelligent Power Manager Eval injection vulnerability |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands. It supports remote monitoring and management of multiple devices in the network from the interface. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-1552 | CVE-2021-23276 | Eaton Intelligent Power Manager SQL injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base. It supports remote monitoring and management of multiple devices in the network from the interface. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-0777 | CVE-2021-21729 | ZTE Cross-site request forgery vulnerabilities in multiple products |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1
| VAR-202104-0778 | CVE-2021-21730 | ZTE ZXHN H168N Security hole |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
A ZTE product is impacted by improper access control vulnerability. The attacker could exploit this vulnerability to access CLI by brute force attacks.This affects: ZXHN H168N V3.5.0_TY.T6
| VAR-202104-1029 | CVE-2021-27603 | SAP NetWeaver AS ABAP Vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: Medium |
An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, 740, 750, allows to keep a work process busy for any length of time. An attacker could call this function module multiple times to block all work processes thereby causing Denial of Service and affecting the Availability of the SAP system. SAP NetWeaver AS ABAP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
| VAR-202104-1554 | CVE-2021-23278 | Eaton Intelligent Power Manager arbitrary file deletion vulnerability (CNVD-2021-31672) |
CVSS V2: 5.5 CVSS V3: 9.6 Severity: CRITICAL |
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed. Eaton Intelligent Power Manager (IPM) is an intelligent power manager from Eaton, USA. It supports remote monitoring and management of multiple devices in the network from the interface. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-1556 | CVE-2021-23280 | Eaton Intelligent Power Manager arbitrary file upload vulnerability |
CVSS V2: 6.5 CVSS V3: 9.9 Severity: CRITICAL |
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability. It supports remote monitoring and management of multiple devices in the network from the interface. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202105-0617 | CVE-2021-1499 | Cisco HyperFlex HX Data Platform Access Control Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user. Cisco HyperFlex HX Data Platform is a network device of Cisco (Cisco) in the United States. Provide enterprise-level agility, scalability, security and life cycle management functions. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements