VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202101-0084 CVE-2020-11149 plural  Qualcomm  Buffer error vulnerability in the product CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
Out of bound access due to usage of an out-of-range pointer offset in the camera driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The Qualcomm chip is a chip of Qualcomm (Qualcomm). A way to miniaturize circuits (mainly including semiconductor equipment, but also passive components, etc.) and often manufactured on the surface of semiconductor wafers
VAR-202012-1591 No CVE Nanjing Xindi Eco-God Windows Network Web Edition has an out of bounds access vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Nanjing Xindison Software Technology Co., Ltd. is a high-tech enterprise specializing in the development and sales of industrial control general configuration and embedded software. Nanjing Xindi Eco-God Windows Network Web version has an out-of-bounds access vulnerability. Attackers can use the vulnerability to cause a denial of service attack.
VAR-202012-1593 No CVE ForceControl Technology ForceControl draw.exe has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. ForceControl Technology ForceControl draw.exe has a denial of service vulnerability, which can be exploited by attackers to cause application crashes.
VAR-202012-1595 No CVE ForceControl Technology ForceControl Web service catalog has arbitrary file download vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. ForceControl Technology ForceControl Web service catalog has arbitrary file download vulnerabilities. Attackers can use this vulnerability to obtain sensitive information.
VAR-202012-1596 No CVE ForceControl Technology ForceControl httpsvr.exe has a buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. ForceControl Technology ForceControl httpsvr.exe has a buffer overflow vulnerability, which can be exploited by an attacker to cause a remote denial of service attack.
VAR-202012-1604 No CVE Nanjing Xindi Eco-God Windows Network Web Edition has a buffer overflow vulnerability (CNVD-2020-62383) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Nanjing Xindison Software Technology Co., Ltd. is a high-tech enterprise specializing in the development and sales of industrial control general configuration and embedded software. Nanjing Xindi Eco-God Windows Network Web version has a buffer overflow vulnerability. Attackers can use this vulnerability to cause a denial of service attack.
VAR-202012-1605 No CVE ForceControl Technology ForceControl has a code injection vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. ForceControl Technology ForceControl has a code injection vulnerability, which can be exploited by attackers to gain control of the server.
VAR-202012-1606 No CVE Nanjing Xindi Eco-God Windows Network Web Edition has a buffer overflow vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Nanjing Xindison Software Technology Co., Ltd. is a high-tech enterprise specializing in the development and sales of industrial control general configuration and embedded software. Nanjing Xindi Eco-God Windows Network Web version has a buffer overflow vulnerability. Attackers can use this vulnerability to cause a denial of service attack.
VAR-202012-1610 No CVE ForceControl Technology ForceControl has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. ForceControl Technology ForceControl has a denial of service vulnerability, attackers can use this vulnerability to cause the software to crash and restart.
VAR-202012-1611 No CVE Forcecontrol Technology Forcecontrol has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. Forcecontrol Technology Forcecontrol has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202012-1612 No CVE Forcecontrol Technology Forcecontrol Web directory has arbitrary file download vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Forcecontrol is a monitoring configuration software, mainly used for data acquisition and monitoring control. Forcecontrol Technology Forcecontrol Web directory has an arbitrary file download vulnerability, and attackers can use this vulnerability to obtain sensitive information.
VAR-202012-1613 No CVE Nanjing Xindi Eco-God Windows Network Web Version Has Information Leakage Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Nanjing Xindison Software Technology Co., Ltd. is a high-tech enterprise specializing in the development and sales of industrial control general configuration and embedded software. Nanjing Xindi Eco-God Windows Network Web version has an information disclosure vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202012-1614 No CVE An arbitrary file deletion vulnerability exists in Nanjing Xindi Eco-God Windows Network Web Edition CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Nanjing Xindison Software Technology Co., Ltd. is a high-tech enterprise specializing in the development and sales of industrial control general configuration and embedded software. There is an arbitrary file deletion vulnerability in the Windows web version of Nanjing Xindi Eco-God. Attackers can use this vulnerability to delete files arbitrarily, which will affect the integrity of the application.
VAR-202012-0118 CVE-2020-13945 Apache APISIX  Vulnerability in

Related entries in the VARIoT exploits database: VAR-E-202203-0014
CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5. Apache APISIX Contains an unspecified vulnerability.Information may be obtained
VAR-202012-1564 CVE-2020-17521 Apache Groovy  Vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2. Apache Groovy Contains an unspecified vulnerability.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apache Groovy is an object-oriented programming language based on the Java platform developed by the Apache Foundation of the United States. Security Fix(es): * log4j-core (CVE-2020-9488, CVE-2021-44228) * nodejs-lodash (CVE-2019-10744) * libthrift (CVE-2020-13949) * xstream (CVE-2020-26217, CVE-2020-26259, CVE-2021-21341, CVE-2021-21342, CVE-2021-21343, CVE-2021-21344, CVE-2021-21345, CVE-2021-21346, CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021-21350, CVE-2021-21351) * undertow (CVE-2020-27782, CVE-2021-3597, CVE-2021-3629, CVE-2021-3690) * xmlbeans (CVE-2021-23926) * batik (CVE-2020-11987) * xmlgraphics-commons (CVE-2020-11988) * tomcat (CVE-2020-13943) * bouncycastle (CVE-2020-15522, CVE-2020-15522) * groovy (CVE-2020-17521) * tomcat (CVE-2020-17527) * jetty (CVE-2020-27218, CVE-2020-27223, CVE-2021-28163, CVE-2021-28164, CVE-2021-28169, CVE-2021-34428) * jackson-dataformat-cbor (CVE-2020-28491) * jboss-remoting (CVE-2020-35510) * kubernetes-client (CVE-2021-20218) * netty (CVE-2021-21290, CVE-2021-21295, CVE-2021-21409) * spring-web (CVE-2021-22118) * cxf-core (CVE-2021-22696) * json-smart (CVE-2021-27568) * jakarta.el (CVE-2021-28170) * commons-io (CVE-2021-29425) * sshd-core (CVE-2021-30129) * cxf-rt-rs-json-basic (CVE-2021-30468) * netty-codec (CVE-2021-37136, CVE-2021-37137) * jsoup (CVE-2021-37714) * poi (CVE-2019-12415) * mysql-connector-java (CVE-2020-2875, CVE-2020-2934) * wildfly (CVE-2021-3536) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. Installation instructions are available from the Fuse 7.10.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/ 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Integration Camel-K 1.4 release and security update Advisory ID: RHSA-2021:3205-01 Product: Red Hat Integration Advisory URL: https://access.redhat.com/errata/RHSA-2021:3205 Issue date: 2021-08-18 Cross references: RHBA-2021:79512-01 CVE Names: CVE-2020-13920 CVE-2020-17518 CVE-2020-17521 CVE-2020-26238 CVE-2020-27222 CVE-2020-27782 CVE-2020-28052 CVE-2020-29582 CVE-2021-20218 CVE-2021-27807 CVE-2021-27906 CVE-2021-30468 CVE-2021-31811 ===================================================================== 1. Summary: A minor version update (from 1.3 to 1.4) is now available for Red Hat Integration Camel K that includes bug fixes and enhancements. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: A minor version update (from 1.3 to 1.4) is now available for Red Hat Camel K that includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution (CVE-2020-26238) * californium-core: DTLS - DoS vulnerability for certificate based handshakes (CVE-2020-27222) * undertow: special character in query results in server errors (CVE-2020-27782) * bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052) * activemq: improper authentication allows MITM attack (CVE-2020-13920) * flink: apache-flink: directory traversal attack allows remote file writing through the REST API (CVE-2020-17518) * groovy: OS temporary directory leads to information disclosure (CVE-2020-17521) * kubernetes-client: fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise (CVE-2021-20218) * pdfbox: infinite loop while loading a crafted PDF file (CVE-2021-27807) * cxf-rt-rs-json-basic: CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter (CVE-2021-30468) * kotlin-scripting-jvm: kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure (CVE-2020-29582) * pdfbox: OutOfMemory-Exception while loading a crafted PDF file (CVE-2021-27906) * pdfbox: OutOfMemory-Exception while loading a crafted PDF file (CVE-2021-31811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 1880101 - CVE-2020-13920 activemq: improper authentication allows MITM attack 1901304 - CVE-2020-27782 undertow: special character in query results in server errors 1901655 - CVE-2020-26238 cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution 1912881 - CVE-2020-28052 bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible 1913312 - CVE-2020-17518 apache-flink: directory traversal attack allows remote file writing through the REST API 1922123 - CVE-2020-17521 groovy: OS temporary directory leads to information disclosure 1923405 - CVE-2021-20218 fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise 1930230 - CVE-2020-27222 californium-core: DTLS - DoS vulnerability for certificate based handshakes 1930291 - CVE-2020-29582 kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure 1941050 - CVE-2021-27906 pdfbox: OutOfMemory-Exception while loading a crafted PDF file 1941055 - CVE-2021-27807 pdfbox: infinite loop while loading a crafted PDF file 1971648 - CVE-2021-31811 pdfbox: OutOfMemory-Exception while loading a crafted PDF file 1973392 - CVE-2021-30468 CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter 5. References: https://access.redhat.com/security/cve/CVE-2020-13920 https://access.redhat.com/security/cve/CVE-2020-17518 https://access.redhat.com/security/cve/CVE-2020-17521 https://access.redhat.com/security/cve/CVE-2020-26238 https://access.redhat.com/security/cve/CVE-2020-27222 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-28052 https://access.redhat.com/security/cve/CVE-2020-29582 https://access.redhat.com/security/cve/CVE-2021-20218 https://access.redhat.com/security/cve/CVE-2021-27807 https://access.redhat.com/security/cve/CVE-2021-27906 https://access.redhat.com/security/cve/CVE-2021-30468 https://access.redhat.com/security/cve/CVE-2021-31811 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_integration/2021.q3/html/getting_started_with_camel_k/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2021-Q3 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYRzPW9zjgjWX9erEAQiQhg//Wv8T0xe0RsVX2iYN5d3OYHtnEAFu2iyQ sLt4E+Ed6nR95DkWfqbC/YIpE2w9UXgZXYG31Roup+zGNYScSpkUliOyH8rPoH2R TKWcUOQ5FzhDtWvrpss3x7fZ9dCXw6d38FRPCLby9Z05I9fLGTjqRcZQr7W3jz9t xiTdEhGKED4cgnwpPkUIBiSOF5bAhDAhYmXw0e2wvm/1XhhAOcA85U0d0Ac9lLjS y07agVx5UZxEDd5rT7ATPlJwfprNQUJKb5Zg+RCOEs5vLMVRHajuW7rG0z+FfhdK ckz3nektLdOJDcaZj/MdjqB+MZtuXJ48WzBnmKRpCeS/FIOp9XrM0xjrYjCB1Eu6 ls03UI6sbg0zi+fw995mNNoKoq7ErEzKGN1ROh693P0fNGJkvxDopP3GEChTjsMZ PJTOyKQyRQ4B5OXmemsoBiwiggmCX3E0rvF1dNCfYA4kWRth/B4A3MaTvpcnm1kO rZKRbCLDQ2rCbtyKLSn/vROi6RYn/4wtz3IudJCZsZXWVAh48iGhLPxYwxabwbyi rgcslBGkdjdlC+RhKmlPnDyV+q0P+uPupoRCaMKBsIZwdfO9oUZ3Zq/FqfVsab/L 5rv8NunH7+HHXMEx6wBNfqLtQ0pvCmJu/lD719jibgIgK0zZ00tQ54Z25X38C0v6 tw7zI6hjLQY= =rVez -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202012-1621 No CVE Microsoft Windows Bluetooth has logic flaw vulnerability (CNVD-2020-59796) CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Microsoft (Chinese name Microsoft Corporation or American Microsoft Corporation) is an American multinational technology company that focuses on R&D, manufacturing, licensing and providing a wide range of computer software services. Microsoft Windows Bluetooth has a logic flaw vulnerability. Attackers can use this vulnerability to elevate permissions and perform malicious operations.
VAR-202012-1622 No CVE Microsoft Windows Bluetooth has logic flaw vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Microsoft (Chinese name Microsoft Corporation or American Microsoft Corporation) is an American multinational technology company that focuses on R&D, manufacturing, licensing and providing a wide range of computer software services. Microsoft Windows Bluetooth has a logic flaw vulnerability. Attackers can use this vulnerability to elevate permissions and perform malicious operations.
VAR-202012-1625 No CVE Command execution vulnerability exists in Xiaotiancai's phone watch CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Xiaotiancai Phone Watch is a children's smart watch designed to meet the needs of children and tailored for children aged 5-12. It integrates functions such as calling, positioning, micro-chat, and making friends. Xiaotiancai's phone watch has a command execution vulnerability. Attackers can use the vulnerability to execute commands remotely.
VAR-202012-1584 No CVE Yungen G10 4G has command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Yungen G10 4G is an in-vehicle entertainment terminal suitable for more than 200 models from more than ten manufacturers such as Volkswagen, Great Wall, and Changan. Yungen G10 4G has a command execution vulnerability. Attackers can use vulnerabilities in WiFi networks to gain device root permissions without the user's perception.
VAR-202012-1592 No CVE An information disclosure vulnerability exists in the monitoring configuration software of Zijinqiao CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Zijinqiao monitoring configuration software is a professional Zijinqiao monitoring configuration software, adopts C/S architecture, has database processing technology and graphics system. An information disclosure vulnerability exists in the monitoring configuration software of Zijinqiao. Attacks can use vulnerabilities to obtain sensitive information.