VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-0123 CVE-2020-11114 plural  Qualcomm  Out-of-bounds read vulnerabilities in the product CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
u'Bluetooth devices does not properly restrict the L2CAP payload length allowing users in radio range to cause a buffer overflow via a crafted Link Layer packet(Equivalent to CVE-2019-17060,CVE-2019-17061 and CVE-2019-17517 in Sweyntooth paper)' in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in AR9344. plural Qualcomm The product contains an out-of-bounds read vulnerability. This vulnerability is CVE-2019-17060 , CVE-2019-17061 , CVE-2019-17517 It is the same vulnerability as.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm AR9344 is a Qualcomm mobile device chip from Qualcomm. Several components in AR9344 have security vulnerabilities, which can cause buffer overflow problems
VAR-202011-1586 No CVE GE PACSystems Rx3i has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
PACSystems Rx3i is a programmable automation controller of General Electric Company. GE PACSystems Rx3i has a denial of service vulnerability, which can be exploited by attackers to cause device crashes.
VAR-202011-1587 No CVE Tianqing security isolation and information exchange system has command execution loopholes (CNVD-2020-60067) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Tianqing Security Isolation and Information Exchange System is an access control switch device with network isolation technology independently developed by Beijing Venustech Information Technology Co., Ltd. It provides high-security isolation protection for key data. Tianqing security isolation and information exchange system has a command execution vulnerability, which can be used by attackers to execute arbitrary operating system commands.
VAR-202011-1588 No CVE Tianqing security isolation and information exchange system has command execution loopholes CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Tianqing Security Isolation and Information Exchange System is an access control switch device with network isolation technology independently developed by Beijing Venustech Information Technology Co., Ltd. It provides high-security isolation protection for key data. Tianqing security isolation and information exchange system has a command execution vulnerability, which can be used by attackers to execute arbitrary operating system commands.
VAR-202011-1523 No CVE China Mobile Railcom Co., Ltd. Yao routing has weak password vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
China Mobile Railway Tongyao Router is a home router. China Mobile Railcom Co., Ltd. Yao routing has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202010-1594 No CVE Siemens X200 series industrial Ethernet switches have stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Siemens is the world's leading technology company, relying on innovations in the fields of electrification, automation and digitalization to provide customers with solutions in the fields of power generation and transmission and distribution, infrastructure, industrial automation, drives and software. Siemens X200 series industrial Ethernet switches have a stack buffer overflow vulnerability, which can be exploited by attackers to affect usability.
VAR-202010-1595 No CVE Zhejiang Dahua Technology Co., Ltd. Dahua DSS system has an arbitrary file download vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Zhejiang Dahua DSS (digital surveillance system) is a comprehensive management platform that integrates four security subsystem management functions: video, alarm, access control, and intercom. The DSS of Zhejiang Dahua Technology Co., Ltd. has an arbitrary file download vulnerability. Attackers can use this vulnerability to download arbitrary files on the login interface to obtain sensitive information.
VAR-202010-1596 No CVE Hangzhou Hikvision System Technology Co., Ltd. video encoding device access gateway has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Hikvision System Technology Co., Ltd. is a provider of security products and industry solutions. Hangzhou Hikvision System Technology Co., Ltd. video encoding equipment access gateway has a weak password vulnerability. Attackers can use this vulnerability to log in to the gateway backend to obtain sensitive information.
VAR-202010-1615 No CVE Siemens X200 series industrial Ethernet switches have stack buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Siemens is the world's leading technology company, relying on innovations in the fields of electrification, automation and digitalization to provide customers with solutions in the fields of power generation and transmission and distribution, infrastructure, industrial automation, drives and software. Siemens X200 series industrial Ethernet switches have a stack buffer overflow vulnerability, which can be exploited by attackers to affect system availability.
VAR-202010-1616 No CVE Siemens X200 series industrial Ethernet switches have permissions and access control vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Siemens is the world's leading technology company, relying on innovations in the fields of electrification, automation and digitalization to provide customers with solutions in the fields of power generation and transmission and distribution, infrastructure, industrial automation, drives and software. Siemens X200 series industrial Ethernet switches have permission and access control loopholes, which can be exploited by attackers to affect system availability.
VAR-202010-1601 No CVE H3C's H3C intrusion prevention system product iWare series has SQL injection vulnerabilities CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
New H3C Technology Co., Ltd. is committed to becoming the most reliable partner for customers' business innovation and digital transformation. Main products include routers, big data, switches, Internet of Things, cloud computing, servers, etc. H3C's H3C intrusion prevention system product iWare series has a SQL injection vulnerability. Attackers can use this vulnerability to obtain sensitive database information.
VAR-202012-1529 CVE-2020-25649 FasterXML Jackson Databind  In  XML  External entity vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity. FasterXML Jackson is a data processing tool for Java developed by American FasterXML Company. There is a security vulnerability in FasterXML Jackson Databind, which can be exploited by an attacker to transmit malicious XML data to FasterXML Jackson Databind to read files, scan sites, or trigger a denial of service. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Description: Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. Security Fix(es): * xmlgraphics-commons: SSRF due to improper input validation by the XMPParser (CVE-2020-11988) * xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream (CVE-2021-21341) * xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream (CVE-2021-21351) * xstream: arbitrary file deletion on the local host via crafted input stream (CVE-2021-21343) * xstream: arbitrary file deletion on the local host when unmarshalling (CVE-2020-26259) * xstream: ReDoS vulnerability (CVE-2021-21348) * xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling (CVE-2020-26258) * xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host (CVE-2021-21349) * xstream: SSRF via crafted input stream (CVE-2021-21342) * jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) (CVE-2020-25649) * xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream (CVE-2021-21350) * xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream (CVE-2021-21347) * xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream (CVE-2021-21346) * xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream (CVE-2021-21345) * xstream: arbitrary code execution via crafted input stream (CVE-2021-21344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) 1908832 - CVE-2020-26258 XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling 1908837 - CVE-2020-26259 XStream: arbitrary file deletion on the local host when unmarshalling 1933816 - CVE-2020-11988 xmlgraphics-commons: SSRF due to improper input validation by the XMPParser 1942539 - CVE-2021-21341 XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream 1942545 - CVE-2021-21342 XStream: SSRF via crafted input stream 1942550 - CVE-2021-21343 XStream: arbitrary file deletion on the local host via crafted input stream 1942554 - CVE-2021-21344 XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet 1942558 - CVE-2021-21345 XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry 1942578 - CVE-2021-21346 XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue 1942629 - CVE-2021-21347 XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator 1942633 - CVE-2021-21348 XStream: ReDoS vulnerability 1942635 - CVE-2021-21349 XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host 1942637 - CVE-2021-21350 XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader 1942642 - CVE-2021-21351 XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream 5. Description: Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. The References section of this erratum contains a download link (you must log in to download the update). The JBoss server process must be restarted for the update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.4 security update Advisory ID: RHSA-2020:5340-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:5340 Issue date: 2020-12-03 CVE Names: CVE-2020-25638 CVE-2020-25644 CVE-2020-25649 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.4 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (CVE-2020-25649) * hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used (CVE-2020-25638) * wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL (CVE-2020-25644) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1881353 - CVE-2020-25638 hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used 1885485 - CVE-2020-25644 wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL 1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-20029 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00011 to 2.9.0.redhat-00016 JBEAP-20089 - [GSS] (7.3.z) Upgrade undertow from 2.0.31.SP1-redhat-00001 to 2.0.32.SP1-redhat JBEAP-20119 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.18.Final-redhat-00001 to 5.0.19.Final-redhat-00001 JBEAP-20161 - [GSS](7.3.z) Upgrade XNIO from 3.7.9.Final to 3.7.11.Final JBEAP-20221 - Tracker bug for the EAP 7.3.4 release for RHEL-6 JBEAP-20239 - [GSS](7.3.z) Upgrade Hibernate Validator from 6.0.20.Final to 6.0.21.Final JBEAP-20246 - [GSS](7.3.z) Upgrade JBoss Marshalling from 2.0.9.Final to 2.0.10.Final JBEAP-20285 - [GSS](7.3.z) Upgrade HAL from 3.2.10.Final-redhat-00001 to 3.2.11.Final JBEAP-20300 - (7.3.z) Upgrade jasypt from 1.9.3-redhat-00001 to 1.9.3-redhat-00002 JBEAP-20325 - (7.3.z) Upgrade WildFly Arquillian to 3.0.1.Final for the ts.bootable profile JBEAP-20364 - (7.3.z) Upgrade com.github.fge.msg-simple to 1.1.0.redhat-00007 and com.github.fge.btf to 1.2.0.redhat-00007 JBEAP-20368 - (7.3.z) Upgrade Bootable JAR Maven plugin to 2.0.1.Final 7. Package List: Red Hat JBoss EAP 7.3 for RHEL 6 Server: Source: eap7-activemq-artemis-2.9.0-6.redhat_00016.1.el6eap.src.rpm eap7-fge-btf-1.2.0-1.redhat_00007.1.el6eap.src.rpm eap7-fge-msg-simple-1.1.0-1.redhat_00007.1.el6eap.src.rpm eap7-hal-console-3.2.11-1.Final_redhat_00001.1.el6eap.src.rpm eap7-hibernate-validator-6.0.21-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jackson-annotations-2.10.4-1.redhat_00002.1.el6eap.src.rpm eap7-jackson-core-2.10.4-1.redhat_00002.1.el6eap.src.rpm eap7-jackson-coreutils-1.6.0-1.redhat_00006.1.el6eap.src.rpm eap7-jackson-jaxrs-providers-2.10.4-1.redhat_00002.1.el6eap.src.rpm eap7-jackson-modules-base-2.10.4-3.redhat_00002.1.el6eap.src.rpm eap7-jackson-modules-java8-2.10.4-1.redhat_00002.1.el6eap.src.rpm eap7-jasypt-1.9.3-1.redhat_00002.1.el6eap.src.rpm eap7-jboss-marshalling-2.0.10-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-remoting-5.0.19-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-server-migration-1.7.2-3.Final_redhat_00004.1.el6eap.src.rpm eap7-jboss-xnio-base-3.7.11-1.Final_redhat_00001.1.el6eap.src.rpm eap7-undertow-2.0.32-1.SP1_redhat_00001.1.el6eap.src.rpm eap7-wildfly-7.3.4-3.GA_redhat_00003.1.el6eap.src.rpm eap7-wildfly-elytron-1.10.9-1.Final_redhat_00001.1.el6eap.src.rpm eap7-wildfly-openssl-1.0.12-1.Final_redhat_00001.1.el6eap.src.rpm noarch: eap7-activemq-artemis-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-cli-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-commons-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-core-client-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-dto-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-jms-client-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-jms-server-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-journal-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-ra-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-selector-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-server-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-activemq-artemis-tools-2.9.0-6.redhat_00016.1.el6eap.noarch.rpm eap7-fge-btf-1.2.0-1.redhat_00007.1.el6eap.noarch.rpm eap7-fge-msg-simple-1.1.0-1.redhat_00007.1.el6eap.noarch.rpm eap7-hal-console-3.2.11-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-validator-6.0.21-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-validator-cdi-6.0.21-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jackson-annotations-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-core-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-coreutils-1.6.0-1.redhat_00006.1.el6eap.noarch.rpm eap7-jackson-datatype-jdk8-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-datatype-jsr310-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-jaxrs-base-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-jaxrs-json-provider-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-module-jaxb-annotations-2.10.4-3.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-modules-base-2.10.4-3.redhat_00002.1.el6eap.noarch.rpm eap7-jackson-modules-java8-2.10.4-1.redhat_00002.1.el6eap.noarch.rpm eap7-jasypt-1.9.3-1.redhat_00002.1.el6eap.noarch.rpm eap7-jboss-marshalling-2.0.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-marshalling-river-2.0.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-remoting-5.0.19-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-server-migration-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-cli-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-core-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.3-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly15.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly16.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly17.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly18.0-server-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.7.2-3.Final_redhat_00004.1.el6eap.noarch.rpm eap7-jboss-xnio-base-3.7.11-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-undertow-2.0.32-1.SP1_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-7.3.4-3.GA_redhat_00003.1.el6eap.noarch.rpm eap7-wildfly-elytron-1.10.9-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-elytron-tool-1.10.9-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-javadocs-7.3.4-3.GA_redhat_00003.1.el6eap.noarch.rpm eap7-wildfly-modules-7.3.4-3.GA_redhat_00003.1.el6eap.noarch.rpm eap7-wildfly-openssl-1.0.12-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-openssl-java-1.0.12-1.Final_redhat_00001.1.el6eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-25638 https://access.redhat.com/security/cve/CVE-2020-25644 https://access.redhat.com/security/cve/CVE-2020-25649 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX8k7JtzjgjWX9erEAQhfXg//SOObf0dLpceG0IYYJaIk0FWkV70IaOfy DuXhE3gGBQYG/OairpC0tXlEUT8vZQ6hrDoyuBmGJJyTAYcUzun0sw/rx1dOWMX2 W/r6EJIR3bhbmClm0Xk82TuQzgPBfWAH2cqWiYcuJkETX7L6GIXmayijJpBMuFNG DCgMd1yK0+4oZVeVhQgB/syKG+i8EENB7I5UJArKy/rpWUGzP3UJrPcwwKj8nSs2 zQTaX67dxJrbpT0LsjVLgBUzUfa7inFT0hzUdlAIogmz36hwqKucUT+0th2Ty5S7 HEsSkiDJJVBCk9oz/VYIf/aIjZFxJHHyHMKmnuLXGGBlKy5g+oXIwMjOyMsd/UY2 v0ooJXNy2wEUapJuxRPdXc4ug/pCgvlEZaxC5hBULOQ1bmxFkO+QCsUcFKs3k4hl D+ZvkiF8mAOKMMu4NU89Ye3RPzGOZIRVoezn7Ayg+VUQvhrb9xe0CNazoyPV4x7O 75VgXR3WA546QIqHneqE0KpN87WWtYwPEt3UcCLTHQ4f3ZiV4z4+8IJVAe9ZjsD4 ik+XA89UUiqX5w5PphF7GP9HkLoD3J3NfGB+DR+ZjrKkQxEGoiq3448XRI08TnXF mYH94mXB9Weoee4fczhu275Sz2ONmWqGy9YfgljstHbG9nkl3prvq3qacnMG317m 5e5jybOAeu8=kQhq -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
VAR-202010-1597 No CVE Rockchip microchip has a conditional contention loophole (CNVD-2020-63711) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Rockchip Microelectronics Co., Ltd. has a R&D team specializing in system-level chip design and algorithm research, providing professional chip solutions for high-end smart hardware, mobile phone peripherals, tablet computers, TV set-top boxes, industrial control and other fields. Rockchip Microchip has loopholes in conditional competition. Attackers can use this vulnerability to cause the program to crash.
VAR-202010-1599 No CVE Unauthorized access vulnerability exists in China Mobile Yu routing (CNVD-2020-62001) CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
China Mobile Yu Router is a router. There are unauthorized access vulnerabilities in China Mobile Yu routing. Attackers can use this vulnerability to directly access the router backend.
VAR-202010-1600 No CVE Weak password vulnerability exists in Zhongyiyu routing CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
China Mobile Yu Router is a router. There is a weak password vulnerability in China Mobile Yu routing. Attackers can use this vulnerability to log in to the router backend to obtain sensitive information.
VAR-202010-1602 No CVE D-Link DIR-852 UPNP protocol request has command execution vulnerability CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
D-Link DIR-852 is a wireless router. The D-Link DIR-852 UPNP protocol request has a command execution vulnerability. Attackers can use vulnerabilities to control routers to execute commands.
VAR-202010-1603 No CVE H3C ER5200G2 has weak password vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
H3C ER5200G2 is a new generation of enterprise-class Gigabit high-performance routers, which are positioned in the SMB market for Ethernet/optical/xDSL access, mainly including government agencies, small and medium-sized enterprises, hotels, schools, hospitals, Internet cafes, etc. that require high-speed Internet access Web environment. H3C ER5200G2 has weak password vulnerability. Attackers can use this vulnerability to log in to the router backend to obtain sensitive information.
VAR-202010-1605 No CVE H3C ERG2-450W has weak password vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
H3C ERG2-450W is an enterprise-class Gigabit VPN router. H3C ERG2-450W has a weak password vulnerability. Attackers can use this vulnerability to log in to the router background to obtain sensitive information.
VAR-202010-1606 No CVE Xiamen Sixin Communication Technology Co., Ltd. WIFI industrial router F5936 has unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
WIFI industrial router F5936 is an industrial grade WIFI router. Xiamen Sixin Communication Technology Co., Ltd. WIFI industrial router F5936 has an unauthorized access vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202010-1607 No CVE Rockchip microchip has a conditional competition vulnerability (CNVD-2020-63710) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Rockchip Microelectronics Co., Ltd. has a R&D team specializing in system-level chip design and algorithm research, providing professional chip solutions for high-end smart hardware, mobile phone peripherals, tablet computers, TV set-top boxes, industrial control and other fields. Rockchip Microchip has loopholes in conditional competition. Attackers can use this vulnerability to cause the program to crash.