VARIoT IoT vulnerabilities database
| VAR-202010-1324 | CVE-2020-3852 | Safari Logic vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A logic issue was addressed with improved validation. This issue is fixed in Safari 13.0.5. A URL scheme may be incorrectly ignored when determining multimedia permission for a website. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems
| VAR-202010-1264 | CVE-2020-9860 | Apple Safari Security hole |
CVSS V2: 5.8 CVSS V3: 5.4 Severity: MEDIUM |
A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in Safari 13.0.5. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. There is a security vulnerability in versions of Apple Safari prior to 13.0.5. The vulnerability stems from the processing of custom URL schemes
| VAR-202010-1258 | CVE-2020-9786 | Apple macOS Catalina Security hole |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
This issue was addressed with improved checks This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. An application may be able to trigger a sysdiagnose. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS Catalina versions prior to 10.15.4 have a security vulnerability in which applications may be able to trigger sysdiagnosis
| VAR-202010-1257 | CVE-2020-9782 | macOS Vulnerability in parsing directory path processing in |
CVSS V2: 6.4 CVSS V3: 7.5 Severity: HIGH |
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A remote attacker may be able to overwrite existing files. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers
| VAR-202010-1255 | CVE-2020-9774 | Apple macOS Catalina and Apple macOS High Sierra Security hole |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue existed with Siri Suggestions access to encrypted data. The issue was fixed by limiting access to encrypted data. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Encrypted data may be inappropriately accessed. Apple macOS High Sierra and Apple macOS Catalina are a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS Catalina versions prior to 10.15.3 have a security vulnerability that stems from an issue when Siri advises users to access encrypted data, which could be inappropriately accessed
| VAR-202010-1250 | CVE-2020-9932 | plural Apple Memory corruption vulnerability in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A memory corruption issue was addressed with improved validation. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, tvOS 13. Processing maliciously crafted web content may lead to arbitrary code execution. Apple tvOS and others are all products of Apple (Apple). tvOS is a smart TV operating system. Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iPadOS is an operating system for iPad tablets. There are security vulnerabilities in many Apple products. The following products and versions are affected: Safari versions prior to 13.0.1, iOS versions prior to 13.1 and iPadOS versions prior to 13.1, and versions prior to tvOS 13
| VAR-202010-0213 | CVE-2019-8618 | plural Apple Logic vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A logic issue was addressed with improved restrictions. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A sandboxed process may be able to circumvent sandbox restrictions. watchOS , macOS , iOS Exists in a logic vulnerability due to a flaw in the processing of restrictions.Sandboxed processes can circumvent sandboxing restrictions. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple macOS High Sierra is a dedicated operating system developed for Mac computers. Apple watchOS is a smart watch operating system
| VAR-202010-0199 | CVE-2019-8639 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices
| VAR-202010-0198 | CVE-2019-8638 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple watchOS is a smart watch operating system
| VAR-202010-0197 | CVE-2019-8633 | plural Apple Product validation vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3, watchOS 5.3. An application may be able to read restricted memory. plural Apple The product contains a validation vulnerability due to a flawed input sanitization process.Limited memory can be read through the application. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple macOS High Sierra is a dedicated operating system developed for Mac computers. tvOS is a smart TV operating system
| VAR-202010-0196 | CVE-2019-8631 | plural Apple Logic vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3. Users removed from an iMessage conversation may still be able to alter state. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. Apple macOS Mojave is a dedicated operating system developed for Mac computers. A security flaw in several Apple products stems from the fact that users who are removed from an iMessage session can still change status
| VAR-202010-0116 | CVE-2019-8858 | macOS Logic vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. A user who shares their screen may not be able to end screen sharing. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers
| VAR-202010-0448 | CVE-2020-24990 | QSC Q-SYS Core Manager Traversal Vulnerability in Japan |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version. QSC Q-SYS is a device used in signal processing from QSC Corporation of the United States. The device is used in audio information processing and information exchange, and can be used in conferences, teachers, lecture halls and other multi-person conference scenarios. Attackers can use this vulnerability to traverse TFTP related directories
| VAR-202010-1343 | CVE-2020-6876 | ZTE eVDC Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A ZTE product is impacted by an XSS vulnerability. The vulnerability is caused by the lack of correct verification of client data in the WEB module. By inserting malicious scripts into the web module, a remote attacker could trigger an XSS attack when the user browses the web page. Then the attacker could use the vulnerability to steal user cookies or destroy the page structure. This affects: eVDC ZXCLOUD-iROSV6.03.04. ZTE eVDC Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. ZTE eVDC is a virtualized data center product service of China ZTE Corporation (ZTE)
| VAR-202010-1610 | No CVE | Sony (China) Co., Ltd. SNC series cameras have unauthorized access vulnerabilities |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
SNC series cameras are network surveillance products produced by Sony.
Sony (China) Co., Ltd. SNC series cameras have unauthorized access vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202010-1612 | No CVE | Hanbang Hi-Tech camera has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Hanbang Hi-Tech Digital Technology Co., Ltd. is a high-tech enterprise. With "video technology" as the core, the company is committed to the research and development of "physical security" and "content security". The core business consists of three parts: smart security, radio and television monitoring and digital watermarking technology.
The camera of Hanbang Hi-Tech has weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202010-1613 | No CVE | BSP Security IPC has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
BSP Security is an enterprise that provides security systems and video surveillance.
BSP Security IPC has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202010-1614 | No CVE | Shenzhen Jingyang Technology Co., Ltd. camera has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Jingyang Technology Co., Ltd. is a leading provider of smart video products and solutions in China, focusing on R&D and innovation of smart video products and solutions for the world.
Shenzhen Jingyang Technology Co., Ltd. camera has a weak password vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202010-1598 | No CVE | D-Link DIR-852 has command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-852 is a wireless router.
D-Link DIR-852 has a command execution vulnerability. The attacker can use the leak to directly control the router.
| VAR-202010-1611 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-62280) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability. Attackers can use this vulnerability to cause the device to restart.