VARIoT IoT vulnerabilities database

VAR-202010-1001 | CVE-2020-27980 | Genexis Platinum-4410 cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Genexis Platinum-4410 P4410-V2-1.28 devices allow stored XSS in the WLAN SSID parameter. This could allow an attacker to perform malicious actions in which the XSS popup will affect all privileged users. Genexis Platinum-4410 Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Genexis Platinum-4410 is a wireless router of British Genexis company.
Genexis Platinum-4410 P4410-V2-1.28 has a cross-site scripting vulnerability
VAR-202010-1488 | CVE-2020-5936 | BIG-IP LTM Resource Depletion Vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile. BIG-IP LTM Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP LTM has a security vulnerability that can be exploited by an attacker to trigger an overload through client-side SSL profile authentication to trigger a denial of service
VAR-202010-1486 | CVE-2020-5934 | BIG-IP APM Vulnerability in |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. BIG-IP APM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. A security vulnerability exists in F5 BIG-IP APM that could allow an attacker to trigger a denial of service by triggering a fatal error on a single logout
VAR-202010-1197 | CVE-2020-5145 | SonicWall Global VPN client Vulnerability in Uncontrolled Search Path Elements |
CVSS V2: 6.9 CVSS V3: 8.6 Severity: HIGH |
SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system. SonicWall Global VPN client There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
VAR-202010-1196 | CVE-2020-5144 | SonicWall Global VPN client Untrusted search path vulnerabilities in |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
SonicWall Global VPN client version 4.10.4.0314 and earlier allows unprivileged windows user to elevate privileges to SYSTEM through loaded process hijacking vulnerability. SonicWall Global VPN client Exists in an untrusted search path vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
VAR-202010-1087 | CVE-2020-5932 | BIG-IP ASM Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, including JavaScript code that will be executed when preview is opened. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance
VAR-202010-1522 | CVE-2020-9982 | Apple Music for Android Information disclosure vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Apple Music 3.4.0 for Android. A malicious application may be able to leak a user's credentials
VAR-202010-1484 | CVE-2020-6023 | Check Point ZoneAlarm Vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. Check Point ZoneAlarm Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Check Point ZoneAlarm is a network firewall program of Israel Check Point Company
VAR-202010-1483 | CVE-2020-6022 | Check Point ZoneAlarm Vulnerability in |
CVSS V2: 3.6 CVSS V3: 5.5 Severity: MEDIUM |
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware. Check Point ZoneAlarm Contains an unspecified vulnerability.Information may be tampered with
VAR-202010-1331 | CVE-2020-3880 | Multiple Apple Product Buffer Error Vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Processing a maliciously crafted image may lead to arbitrary code execution. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple watchOS is a smart watch operating system. Apple iPadOS is an operating system for iPad tablets. The following products and versions are affected: watchOS earlier than 6.1.2, iOS earlier than 13.3.1 and iPadOS earlier than 13.3.1, tvOS earlier than 13.3.1, macOS Catalina earlier than 10.15.3
VAR-202010-1326 | CVE-2020-3863 | Apple macOS Catalina Buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. An application may be able to execute arbitrary code with system privileges. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS Catalina versions prior to 10.15.3 have a security vulnerability that stems from a memory corruption issue that allows applications to execute arbitrary code with system privileges
VAR-202010-1324 | CVE-2020-3852 | Safari Logic vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A logic issue was addressed with improved validation. This issue is fixed in Safari 13.0.5. A URL scheme may be incorrectly ignored when determining multimedia permission for a website. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems
VAR-202010-1264 | CVE-2020-9860 | Apple Safari Security hole |
CVSS V2: 5.8 CVSS V3: 5.4 Severity: MEDIUM |
A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in Safari 13.0.5. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. There is a security vulnerability in versions of Apple Safari prior to 13.0.5. The vulnerability stems from the processing of custom URL schemes
VAR-202010-1258 | CVE-2020-9786 | Apple macOS Catalina Security hole |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
This issue was addressed with improved checks This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. An application may be able to trigger a sysdiagnose. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS Catalina versions prior to 10.15.4 have a security vulnerability in which applications may be able to trigger sysdiagnosis
VAR-202010-1257 | CVE-2020-9782 | macOS Vulnerability in parsing directory path processing in |
CVSS V2: 6.4 CVSS V3: 7.5 Severity: HIGH |
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A remote attacker may be able to overwrite existing files. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-1255 | CVE-2020-9774 | Apple macOS Catalina and Apple macOS High Sierra Security hole |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue existed with Siri Suggestions access to encrypted data. The issue was fixed by limiting access to encrypted data. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Encrypted data may be inappropriately accessed. Apple macOS High Sierra and Apple macOS Catalina are a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS Catalina versions prior to 10.15.3 have a security vulnerability that stems from an issue when Siri advises users to access encrypted data, which could be inappropriately accessed
VAR-202010-1250 | CVE-2020-9932 | plural Apple Memory corruption vulnerability in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A memory corruption issue was addressed with improved validation. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, tvOS 13. Processing maliciously crafted web content may lead to arbitrary code execution. Apple tvOS and others are all products of Apple (Apple). tvOS is a smart TV operating system. Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iPadOS is an operating system for iPad tablets. There are security vulnerabilities in many Apple products. The following products and versions are affected: Safari versions prior to 13.0.1, iOS versions prior to 13.1 and iPadOS versions prior to 13.1, and versions prior to tvOS 13
VAR-202010-0213 | CVE-2019-8618 | plural Apple Logic vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A logic issue was addressed with improved restrictions. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A sandboxed process may be able to circumvent sandbox restrictions. watchOS , macOS , iOS Exists in a logic vulnerability due to a flaw in the processing of restrictions.Sandboxed processes can circumvent sandboxing restrictions. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple macOS High Sierra is a dedicated operating system developed for Mac computers. Apple watchOS is a smart watch operating system
VAR-202010-0199 | CVE-2019-8639 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices
VAR-202010-0198 | CVE-2019-8638 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple watchOS is a smart watch operating system