VARIoT IoT vulnerabilities database

VAR-202007-1515 | No CVE | ZLAN5102 and ZLAN5103 serial server have a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
ZLAN5102 and ZLAN5103 serial server are industrial grade RS232/485 and TCP/IP protocol converters produced by Shanghai ZLAN.
ZLAN5102 and ZLAN5103 serial server have a denial of service vulnerability. Attackers can use this vulnerability to cause the device to restart.
VAR-202007-1510 | No CVE | Unauthorized access vulnerability exists in TVHeadend streaming media server |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Tvheadend is a streaming media server software installed under LINUX system.
TVHeadend streaming media server has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202007-1391 | CVE-2020-4465 | plural IBM Classic buffer overflow vulnerability in product |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
IBM MQ, IBM MQ Appliance, and IBM MQ for HPE NonStop 8.0, 9.1 CD, and 9.1 LTS is vulnerable to a buffer overflow vulnerability due to an error within the channel processing code. A remote attacker could overflow the buffer using an older client and cause a denial of service. IBM X-Force ID: 181562. Vendor exploits this vulnerability IBM X-Force ID: 181562 It is published as.Service operation interruption (DoS) It may be put into a state
VAR-202007-1093 | CVE-2020-4319 | plural IBM Product Information Leakage Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.3 Severity: MEDIUM |
IBM MQ, IBM MQ Appliance, and IBM MQ for HPE NonStop 8.0, 9.1 LTS, and 9.1 CD could allow under special circumstances, an authenticated user to obtain sensitive information due to a data leak from an error message within the pre-v7 pubsub logic. IBM X-Force ID: 177402. Vendor exploits this vulnerability IBM X-Force ID: 177402 It is published as.Information may be obtained
VAR-202007-1084 | CVE-2020-4375 | plural IBM Vulnerability in lack of release of resources after valid lifetime in product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
IBM MQ, IBM MQ Appliance, IBM MQ for HPE NonStop 8.0, 9.1 CD, and 9.1 LTS could allow an attacker to cause a denial of service due to a memory leak caused by an error creating a dynamic queue. IBM X-Force ID: 179080. Vendor exploits this vulnerability IBM X-Force ID: 179080 It is published as.Service operation interruption (DoS) It may be put into a state
VAR-202007-0442 | CVE-2019-4731 | IBM MQ Appliance Vulnerability regarding information leakage in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
IBM MQ Appliance 9.1.4.CD could allow a local attacker to obtain highly sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 172616. IBM MQ Appliance There is an information leakage vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 172616 It is published as.Information may be obtained
VAR-202007-0021 | CVE-2020-10643 | PI Vision Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
An authenticated remote attacker could use specially crafted URLs to send a victim using PI Vision 2019 mobile to a vulnerable web page due to a known issue in a third-party component. PI Vision Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with
VAR-202007-1564 | No CVE | Unauthorized access vulnerability exists in Tianyi Kandian camera |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Tianyi Kandian is a security service that integrates camera, video, real-time monitoring, PTZ control, alarm, and storage.
Tianyi Kandian camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202007-1509 | No CVE | ZLAN serial server has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise providing industrial IoT solutions.
The ZLAN serial server has an unauthorized access vulnerability. Attackers can use the vulnerability to log in to the WEB management interface without authorization.
VAR-202007-1486 | No CVE | Shenzhen Yichen Technology Co., Ltd. wireless router has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Yichen Technology Co., Ltd. is a manufacturer and operator of network and communication equipment.
The wireless router of Shenzhen Yichen Technology Co., Ltd. has an unauthorized access vulnerability. Attackers can use the vulnerability to perform unauthorized operations.
VAR-202007-1381 | CVE-2020-4498 | IBM MQ Appliance information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
IBM MQ Appliance 9.1 LTS and 9.1 CD could allow a local privileged user to obtain highly sensitve information due to inclusion of data within trace files. IBM X-Force ID: 182118. IBM MQ Appliance There is an information leakage vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 182118 It is published as.Information may be obtained. IBM MQ Appliance is an all-in-one device from IBM in the United States for rapid deployment of enterprise-level messaging middleware. Local attackers can use this vulnerability to obtain highly sensitive information
VAR-202007-0651 | CVE-2020-15860 | Parallels Remote Application Server Vulnerability in |
CVSS V2: 6.5 CVSS V3: 9.9 Severity: CRITICAL |
Parallels Remote Application Server (RAS) 17.1.1 has a Business Logic Error causing remote code execution. It allows an authenticated user to execute any application in the backend operating system through the web application, despite the affected application not being published. In addition, it was discovered that it is possible to access any host in the internal domain, even if it has no published applications or the mentioned host is no longer associated with that server farm. (DoS) It may be put into a state
VAR-202007-1424 | CVE-2020-8326 | Lenovo Drivers Management Vulnerabilities in unquoted search paths or elements in |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
An unquoted service path vulnerability was reported in Lenovo Drivers Management prior to version 2.7.1128.1046 that could allow an authenticated user to execute code with elevated privileges. (DoS) It may be put into a state. Lenovo Drivers Management is a driver management application for Lenovo products from China Lenovo (Lenovo). This program is mainly used for driver installation and upgrade, etc
VAR-202007-1184 | CVE-2020-8317 | Lenovo Drivers Management Unreliable search path vulnerabilities in |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
A DLL search path vulnerability was reported in Lenovo Drivers Management prior to version 2.7.1128.1046 that could allow an authenticated user to execute code with elevated privileges. Lenovo Drivers Management Exists in an unreliable search path vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Lenovo Drivers Management is a driver management application for Lenovo products from China Lenovo (Lenovo). This program is mainly used for driver installation and upgrade, etc
VAR-202007-1499 | No CVE | KingView (KingView) has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
KingView (KingView) is an industrial automation configuration software produced by Beijing Yakong Technology Development Co., Ltd.
KingView has a denial of service vulnerability. Attackers can use this vulnerability to launch remote denial of service attacks.
VAR-202007-0326 | CVE-2020-11440 | Wind River Systems VxWorks WebCLI Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
httpRpmFs in WebCLI in Wind River VxWorks 5.5 through 7 SR0640 has no check for an escape from the web root. WebCLI is one of the web-based command line interfaces. Attackers can use this vulnerability to bypass access restrictions by sending a specially crafted request
VAR-202007-0959 | CVE-2020-15916 | Tenda AC15 On the device OS Command injection vulnerabilities |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter. Tenda AC15 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tenda AC15 AC1900 is a wireless router of China Tenda Company.
Tenda AC15 AC1900 15.03.05.19 version of the goform/AdvSetLanip endpoint has security vulnerabilities
VAR-202007-1377 | CVE-2020-4405 | IBM Verify Gateway Vulnerability regarding information leakage from log files in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 could disclose potentially sensitive information to an authenticated user due to world readable log files. IBM X-Force ID: 179484. IBM Verify Gateway (IVG) is a set of cloud-based identity verification solutions from IBM Corporation in the United States. A security vulnerability exists in IBM IVG PAM versions 1.0.0 and 1.0.1. An attacker could exploit this vulnerability to obtain sensitive information
VAR-202007-0690 | CVE-2020-15688 | GoAhead In Capture-replay Authentication Bypass Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. GoAhead for, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is the world's most popular, tiny embedded web server. It is compact, secure and simple to use. GoAhead is deployed in hundreds of millions of devices and is ideal for the smallest of embedded devices.A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. GoAhead versions 3 to 5 validated the nonce with a fixed duration of 5 minutes which permitted short-period replays. This duration is too long for most implementations.Tested on: GoAhead-httpGoAhead-Webs. There is a security vulnerability in Embedthis Software GoAhead versions before 5.1.2. An attacker could exploit this vulnerability to bypass authentication
VAR-202007-1245 | CVE-2020-7520 | Schneider Electric Software Update Open redirect vulnerability in |
CVSS V2: 4.0 CVSS V3: 4.7 Severity: MEDIUM |
A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit. An attacker could exploit this vulnerability to execute malicious code