VARIoT IoT vulnerabilities database

VAR-202010-1567 | CVE-2020-11979 | Apache Ant Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. Apache Ant Contains an unspecified vulnerability.Information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apache Ant is a set of automation tools for Java software development developed by the Apache Software Foundation. This tool is mainly used for software compilation, testing and deployment. The vulnerability stems from the fact that the network system or product lacks correct verification of user input data during the operation process of user input to construct commands, data structures, or records, and does not filter or correctly filter out special elements in it, resulting in parsing or failure of the system or product. Wrong way of interpreting.
Linux Security Advisory GLSA 202011-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Apache Ant: Insecure temporary file
Date: November 16, 2020
Bugs: #745768
ID: 202011-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Apache Ant uses various insecure temporary files possibly allowing
local code execution.
Background
==========
Ant is a Java-based build tool similar to ‘make’ that uses XML
configuration files.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-java/ant < 1.10.9 >= 1.10.9
Description
===========
A previous fix for a security vulnerability involving insecure
temporary files has been found to be incomplete.
Impact
======
A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache Ant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/ant-1.10.9"
References
==========
[ 1 ] CVE-2020-11979
https://nvd.nist.gov/vuln/detail/CVE-2020-11979
[ 2 ] GLSA-202007-34
https://security.gentoo.org/glsa/202007-34
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202011-18
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. Bugs fixed (https://bugzilla.redhat.com/):
1837444 - CVE-2020-1945 ant: insecure temporary file vulnerability
1903702 - CVE-2020-11979 ant: insecure temporary file
1921322 - CVE-2021-21615 jenkins: Filesystem traversal by privileged users
1925140 - CVE-2021-21608 jenkins: Stored XSS vulnerability in button labels
1925141 - CVE-2021-21609 jenkins: Missing permission check for paths with specific prefix
1925143 - CVE-2021-21605 jenkins: Path traversal vulnerability in agent names
1925145 - CVE-2021-21611 jenkins: Stored XSS vulnerability on new item page
1925151 - CVE-2021-21610 jenkins: Reflected XSS vulnerability in markup formatter preview
1925156 - CVE-2021-21607 jenkins: Excessive memory allocation in graph URLs leads to denial of service
1925157 - CVE-2021-21604 jenkins: Improper handling of REST API XML deserialization errors
1925159 - CVE-2021-21606 jenkins: Arbitrary file existence check in file fingerprints
1925160 - CVE-2021-21603 jenkins: XSS vulnerability in notification bar
1925161 - CVE-2021-21602 jenkins: Arbitrary file read vulnerability in workspace browsers
1925674 - Placeholder bug for OCP 4.6.0 rpm release
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 3.11.394 bug fix and security update
Advisory ID: RHSA-2021:0637-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0637
Issue date: 2021-03-03
CVE Names: CVE-2020-1945 CVE-2020-2304 CVE-2020-2305
CVE-2020-2306 CVE-2020-2307 CVE-2020-2308
CVE-2020-2309 CVE-2020-11979 CVE-2020-25658
====================================================================
1. Summary:
Red Hat OpenShift Container Platform release 3.11.394 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat OpenShift Container Platform 3.11 - noarch, ppc64le, x86_64
3. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* jenkins-2-plugins/subversion: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2304)
* jenkins-2-plugins/mercurial: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2305)
* ant: Insecure temporary file vulnerability (CVE-2020-1945)
* jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint
could result in information disclosure (CVE-2020-2306)
* jenkins-2-plugins/kubernetes: Jenkins controller environment variables
are accessible in Kubernetes plug-in (CVE-2020-2307)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
Plugin allows listing pod templates (CVE-2020-2308)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
plug-in allows enumerating credentials IDs (CVE-2020-2309)
* ant: Insecure temporary file (CVE-2020-11979)
* python-rsa: Bleichenbacher timing oracle attack against RSA decryption
(CVE-2020-25658)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.394. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:0638
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_r
elease_notes.html
This update fixes the following bugs among others:
* Previously, the restart-cluster playbook did not evaluate the defined
cluster size for ops clusters. This was causing come clusters to never
complete their restart. This bug fix passes the logging ops cluster size,
allowing restarts of ops clusters to complete successfully. (BZ#1879407)
* Previously, the `openshift_named_certificates` role checked the contents
of the `ca-bundle.crt` file during cluster installation. This caused the
check to fail during initial installation because the `ca-bundle.crt` file
is not yet created in that scenario. This bug fix allows the cluster to
skip checking the `ca-bundle.crt` file if it does not exist, resulting in
initial installations succeeding. (BZ#1920567)
* Previously, if the `openshift_release` attribute was not set in the
Ansible inventory file, the nodes of the cluster would fail during an
upgrade. This was caused by the `cluster_facts.yml` file being gathered
before the `openshift_release` attribute was defined by the upgrade
playbook. Now the `cluster_facts.yml` file is gathered after the
`openshift_version` role runs and the `openshift_release` attribute is set,
allowing for successful node upgrades. (BZ#1921353)
All OpenShift Container Platform 3.11 users are advised to upgrade to these
updated packages and images.
4. Solution:
Before applying this update, ensure all previously released errata relevant
to your system is applied.
See the following documentation, which will be updated shortly for release
3.11.394, for important instructions on how to upgrade your cluster and
fully
apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_r
elease_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
5. Bugs fixed (https://bugzilla.redhat.com/):
1837444 - CVE-2020-1945 ant: insecure temporary file vulnerability
1849003 - fact dicts returned are of type string rather than dict
1873346 - In-place upgrade of OCP 3.11 does not upgrade Kuryr components
1879407 - The restart-cluster playbook doesn't take into account that openshift_logging_es_ops_cluster_size could be different from openshift_logging_es_cluster_size
1889972 - CVE-2020-25658 python-rsa: bleichenbacher timing oracle attack against RSA decryption
1895939 - CVE-2020-2304 jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks
1895940 - CVE-2020-2305 jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
1895941 - CVE-2020-2306 jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure
1895945 - CVE-2020-2307 jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin
1895946 - CVE-2020-2308 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates
1895947 - CVE-2020-2309 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs
1903699 - Prometheus consumes all available memory
1903702 - CVE-2020-11979 ant: insecure temporary file
1918392 - Unable to access kibana URLafter enabling HTTP2 on Haproxy router
1920567 - [release-3.11] - ca-bundle.crt(/etc/origin/master/ca-bundle.crt) is missing on the fresh installation process
1921353 - OCP 3.11.374 Upgrade fails with Either OpenShift needs to be installed or openshift_release needs to be specified
1924614 - Provide jenkins agent image for maven36
1924811 - Provide jenkins agent image for maven36
1929170 - kuryr-cni pods in crashloop after updating OCP due to RuntimeError caused by attempting to delete eth0 host interface
1929216 - KeyError: 'addresses' in kuryr-controller when Endpoints' slice only lists notReadyAddresses
6. Package List:
Red Hat OpenShift Container Platform 3.11:
Source:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.src.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.src.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.src.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.src.rpm
atomic-openshift-dockerregistry-3.11.394-1.git.481.6e48246.el7.src.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.src.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.src.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.src.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.src.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.src.rpm
golang-github-prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.src.rpm
golang-github-prometheus-node_exporter-3.11.394-1.git.1062.8adc4b8.el7.src.rpm
golang-github-prometheus-prometheus-3.11.394-1.git.5026.2c9627f.el7.src.rpm
haproxy-1.8.28-1.el7.src.rpm
jenkins-2-plugins-3.11.1612862361-1.el7.src.rpm
jenkins-2.263.3.1612433584-1.el7.src.rpm
openshift-ansible-3.11.394-6.git.0.47ec25d.el7.src.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.src.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.src.rpm
openshift-kuryr-3.11.394-1.git.1490.16ed375.el7.src.rpm
python-rsa-4.5-3.el7.src.rpm
noarch:
atomic-openshift-docker-excluder-3.11.394-1.git.0.e03a88e.el7.noarch.rpm
atomic-openshift-excluder-3.11.394-1.git.0.e03a88e.el7.noarch.rpm
jenkins-2-plugins-3.11.1612862361-1.el7.noarch.rpm
jenkins-2.263.3.1612433584-1.el7.noarch.rpm
openshift-ansible-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-docs-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-playbooks-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-roles-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-test-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-kuryr-cni-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
openshift-kuryr-common-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
openshift-kuryr-controller-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
python2-kuryr-kubernetes-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
python2-rsa-4.5-3.el7.noarch.rpm
ppc64le:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.ppc64le.rpm
atomic-enterprise-service-catalog-svcat-3.11.394-1.git.1675.fdb6e0b.el7.ppc64le.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-clients-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.ppc64le.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.ppc64le.rpm
atomic-openshift-hyperkube-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-hypershift-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-master-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.ppc64le.rpm
atomic-openshift-node-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.ppc64le.rpm
atomic-openshift-pod-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-sdn-ovs-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.ppc64le.rpm
atomic-openshift-template-service-broker-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-tests-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.ppc64le.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.ppc64le.rpm
haproxy-debuginfo-1.8.28-1.el7.ppc64le.rpm
haproxy18-1.8.28-1.el7.ppc64le.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.ppc64le.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.ppc64le.rpm
prometheus-3.11.394-1.git.5026.2c9627f.el7.ppc64le.rpm
prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.ppc64le.rpm
prometheus-node-exporter-3.11.394-1.git.1062.8adc4b8.el7.ppc64le.rpm
x86_64:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.x86_64.rpm
atomic-enterprise-service-catalog-svcat-3.11.394-1.git.1675.fdb6e0b.el7.x86_64.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-clients-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-clients-redistributable-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.x86_64.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.x86_64.rpm
atomic-openshift-dockerregistry-3.11.394-1.git.481.6e48246.el7.x86_64.rpm
atomic-openshift-hyperkube-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-hypershift-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-master-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.x86_64.rpm
atomic-openshift-node-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.x86_64.rpm
atomic-openshift-pod-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-sdn-ovs-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.x86_64.rpm
atomic-openshift-template-service-broker-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-tests-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.x86_64.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.x86_64.rpm
haproxy-debuginfo-1.8.28-1.el7.x86_64.rpm
haproxy18-1.8.28-1.el7.x86_64.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.x86_64.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.x86_64.rpm
prometheus-3.11.394-1.git.5026.2c9627f.el7.x86_64.rpm
prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.x86_64.rpm
prometheus-node-exporter-3.11.394-1.git.1062.8adc4b8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-1945
https://access.redhat.com/security/cve/CVE-2020-2304
https://access.redhat.com/security/cve/CVE-2020-2305
https://access.redhat.com/security/cve/CVE-2020-2306
https://access.redhat.com/security/cve/CVE-2020-2307
https://access.redhat.com/security/cve/CVE-2020-2308
https://access.redhat.com/security/cve/CVE-2020-2309
https://access.redhat.com/security/cve/CVE-2020-11979
https://access.redhat.com/security/cve/CVE-2020-25658
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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9NLN
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202010-1620 | No CVE | Logic flaws and vulnerabilities existed in the enterprise-level routers of Beenet |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging high-tech company integrating R&D, production and sales.
There is a logic flaw vulnerability in the enterprise-level routers of Beenet Interconnection, which can be used by attackers to obtain sensitive information.
VAR-202010-1621 | No CVE | D-Link ShareCenter DNS-320 and ShareCenter DNS-325 have command execution vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link ShareCenter DNS-320 is a gigabit network storage device of Taiwan D-Link Group. D-Link ShareCenter DNS-325 is a network storage device of Taiwan D-Link Group.
D-Link ShareCenter DNS-320 and ShareCenter DNS-325 have command execution vulnerabilities. Attackers can use vulnerabilities to execute arbitrary commands.
VAR-202010-1622 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CyberControl has a command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
CyberControl is a flexible and customizable automated monitoring software platform that can run on a variety of operating systems. Its application areas include monitoring master stations of large industrial systems to local monitoring systems based on tablet computers.
Beijing Sifang Relay Automation Co., Ltd. CyberControl has a command execution vulnerability. Attackers can use vulnerabilities to execute arbitrary commands.
VAR-202010-1184 | CVE-2020-5387 | Dell XPS 13 9370 BIOS Vulnerability in handling exceptional conditions in |
CVSS V2: 4.9 CVSS V3: 4.4 Severity: MEDIUM |
Dell XPS 13 9370 BIOS versions prior to 1.13.1 contains an Improper Exception Handling vulnerability. A local attacker with physical access could exploit this vulnerability to prevent the system from booting until the exploited boot device is removed. Dell XPS 13 9370 is a notebook computer from Dell in the United States.
The Dell XPS 13 9370 BIOS has a security vulnerability
VAR-202009-0289 | CVE-2020-14030 | Ozeki NG SMS Gateway Untrusted Data Deserialization Vulnerability in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution. Ozeki NG SMS Gateway There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The program can convert your incoming emails to SMS and send them to your mobile phone. The main functions are: (1), send and receive messages in two ways (from phone to system, from system to phone); (2), support various applications of desktop email and Webmail; (3), powerful The server supports the program and stores your SMS to send and receive these; (4), supports multiple devices, etc
VAR-202009-1719 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53556) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1720 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53557) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1721 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53558) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1722 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53559) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1736 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53553) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1737 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53554) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1738 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53555) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1666 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53561) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1668 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53552) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1664 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53560) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1675 | No CVE | Redmi Note7 has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-0518 | CVE-2019-18989 | Mediatek MT7620N Authentication vulnerabilities in |
CVSS V2: 4.8 CVSS V3: 5.4 Severity: MEDIUM |
A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data. Mediatek MT7620N Contains an authentication vulnerability.Information may be obtained and information may be tampered with. Mediatek MT7620N is an IEEE802.11n on-chip routing chip of China MediaTek
VAR-202009-1557 | CVE-2020-12506 | WAGO 750-8XX Authentication vulnerabilities in series firmware |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions. WAGO 750-8XX There is an authentication vulnerability in the series firmware.Information is tampered with and denial of service (DoS) It may be put into a state
VAR-202009-1341 | CVE-2020-5132 | SonicWall SSL-VPN Product vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organization’s internal domain names in the SSL-VPN authentication page, an attacker with knowledge of internal domain names can potentially take advantage of this vulnerability. SonicWall SSL-VPN The product contains unspecified vulnerabilities.Information may be obtained. sonicwall ssl-vpn (sonicwall ssl-vpn, vpn) is a VPN connection solution of SonicWALL. This product is used for remote secure connections