VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202008-1318 No CVE Hollysys configuration software MACS has an arbitrary file deletion vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hollysys was founded in 1993 and is a leading supplier of automation and information technology solutions in China. Hollysys configuration software MACS has an arbitrary file deletion vulnerability. Attackers can use this vulnerability to delete arbitrary files.
VAR-202008-1315 No CVE Beijing Yakong Technology Development Co., Ltd. KingView has a DLL hijacking vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
KingView is the first industrial configuration software product launched by Beijing Yakong Technology Development Co., Ltd. in China. Beijing Yakong Technology Development Co., Ltd. KingView has a DLL hijacking vulnerability. Attackers can use this vulnerability to load malicious DLL files for command execution.
VAR-202008-0367 CVE-2020-16205 G-Cam and G-Code In OS Command injection vulnerabilities CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Using a specially crafted URL command, a remote authenticated user can execute commands as root on the G-Cam and G-Code (Firmware Versions 1.12.0.25 and prior as well as the limited Versions 1.12.13.2 and 1.12.14.5). G-Cam and G-Code To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Geutebruck GmbH is a German high-tech private company that specializes in designing and producing high-quality, perfectly matched video security solutions. Geutebruck IP Cameras certification RCE vulnerability
VAR-202008-0382 CVE-2020-16217 Advantech WebAccess HMI Designer resource management error vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: High
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. A double free vulnerability caused by processing specially crafted project files may allow remote code execution, disclosure/modification of information, or cause the application to crash. WebAccess HMI Designer Is Advantech Company Provides Human Machine Interface (HMI) Development software. WebAccess HMI Designer The following multiple vulnerabilities exist in. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/HMI Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PM3 files. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. The product has functions such as data transmission, menu editing and text editing
VAR-202008-1237 CVE-2020-16215 Advantech Made WebAccess HMI Designer Multiple vulnerabilities in CVSS V2: 9.3
CVSS V3: 7.8
Severity: High
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash. WebAccess HMI Designer Is Advantech Company Provides Human Machine Interface (HMI) Development software. WebAccess HMI Designer The following multiple vulnerabilities exist in. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwPFile.exe when invoked via IOCTL 0x2711. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. The product has functions such as data transmission, menu editing and text editing. There is a buffer overflow vulnerability in Advantech WebAccess HMI Designer 2.1.9.31 and earlier versions, which is caused by the program's failure to correctly verify the data submitted by the user
VAR-202008-0793 CVE-2020-3346 Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web UI of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
VAR-202008-0813 CVE-2020-3447 Cisco Email Security Appliance and Cisco Content Security Management Appliance Vulnerability regarding information leakage from log files in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the CLI of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to excessive verbosity in certain log subscriptions. An attacker could exploit this vulnerability by accessing specific log files on an affected device. A successful exploit could allow the attacker to obtain sensitive log data, which may include user credentials. To exploit this vulnerability, the attacker would need to have valid credentials at the operator level or higher on the affected device. This appliance is mainly used to manage all policies, reports, audit information, etc. of email and web security appliances
VAR-202008-0832 CVE-2020-3501 Cisco Webex Meetings Desktop Input validation vulnerabilities in applications CVSS V2: 3.5
CVSS V3: 4.1
Severity: MEDIUM
Multiple vulnerabilities in the user interface of Cisco Webex Meetings Desktop App could allow an authenticated, remote attacker to obtain restricted information from other Webex users. These vulnerabilities are due to improper input validation of parameters returned to the application from a web site. An attacker with a valid Webex account could exploit these vulnerabilities by persuading a user to follow a URL that is designed to return malicious path parameters to the affected software. A successful exploit could allow the attacker to obtain restricted information from other Webex users. Cisco Webex Meetings Desktop The application contains an input verification vulnerability.Information may be obtained
VAR-202008-0833 CVE-2020-3502 Cisco Webex Meetings Desktop Input validation vulnerabilities in applications CVSS V2: 3.5
CVSS V3: 4.1
Severity: MEDIUM
Multiple vulnerabilities in the user interface of Cisco Webex Meetings Desktop App could allow an authenticated, remote attacker to obtain restricted information from other Webex users. These vulnerabilities are due to improper input validation of parameters returned to the application from a web site. An attacker with a valid Webex account could exploit these vulnerabilities by persuading a user to follow a URL that is designed to return malicious path parameters to the affected software. A successful exploit could allow the attacker to obtain restricted information from other Webex users. Cisco Webex Meetings Desktop The application contains an input verification vulnerability.Information may be obtained
VAR-202008-0815 CVE-2020-3449 Cisco IOS XR Software vulnerabilities related to checking exceptional conditions CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the Border Gateway Protocol (BGP) additional paths feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent authorized users from monitoring the BGP status and cause the BGP process to stop processing new updates, resulting in a denial of service (DOS) condition. The vulnerability is due to an incorrect calculation of lexicographical order when displaying additional path information within Cisco IOS XR Software, which causes an infinite loop. An attacker could exploit this vulnerability by sending a specific BGP update from a BGP neighbor peer session of an affected device; an authorized user must then issue a show bgp command for the vulnerability to be exploited. A successful exploit could allow the attacker to prevent authorized users from properly monitoring the BGP status and prevent BGP from processing new updates, resulting in outdated information in the routing and forwarding tables. Cisco IOS XR is an operating system developed by Cisco for its network equipment
VAR-202008-0818 CVE-2020-3464 Cisco UCS Director Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco UCS Director could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need administrative credentials on the affected device. Cisco UCS Director Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. Cisco UCS Director is a heterogeneous platform of private cloud infrastructure as a service (IaaS) of Cisco (Cisco)
VAR-202008-0802 CVE-2020-3434 Windows for Cisco AnyConnect Secure Mobility Client Input verification vulnerability in CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to stop the AnyConnect process, causing a DoS condition on the device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to the fact that the program does not fully verify the input submitted by the user
VAR-202008-0803 CVE-2020-3435 Windows for Cisco AnyConnect Secure Mobility Client Input verification vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to the fact that the program does not fully verify the input submitted by the user
VAR-202008-0801 CVE-2020-3433 Windows for Cisco AnyConnect Secure Mobility Client Vulnerability in uncontrolled search path elements in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. (DoS) It may be put into a state
VAR-202008-1169 CVE-2020-9036 Jeedom cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Jeedom through 4.0.38 allows XSS. Jeedom Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. Jeedom is an open source home automation solution for the Internet of Things. The vulnerability stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code
VAR-202008-1172 CVE-2020-9078 FusionCompute Vulnerabilities related to authority management in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
FusionCompute 8.0.0 have local privilege escalation vulnerability. A local, authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service. FusionCompute Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Huawei FusionCompute is a computer virtualization engine developed by Huawei in China. The product provides Virtual Resource Manager (VRM) and Compute Node Agent (CNA), etc. Security vulnerabilities exist in Huawei FusionCompute version 8.0.0
VAR-202008-1052 CVE-2020-9079 FusionSphere OpenStack  Vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism. An attacker has to find a way to exploit the vulnerability to conduct directed attacks against the affected product. FusionSphere OpenStack Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put in a state. Huawei FusionSphere OpenStack is an OpenStack-based cloud operating system developed by China's Huawei (Huawei). There is a security vulnerability in Huawei FusionSphere OpenStack version 8.0.0
VAR-202008-1042 CVE-2020-9229 FusionCompute Vulnerability regarding information leakage in CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information. Huawei FusionCompute is a computer virtualization engine developed by Huawei in China. The product provides Virtual Resource Manager (VRM) and Compute Node Agent (CNA), etc
VAR-202008-1041 CVE-2020-9228 FusionCompute Vulnerability regarding information leakage in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information. Huawei FusionCompute is a computer virtualization engine developed by Huawei in China. The product provides Virtual Resource Manager (VRM) and Compute Node Agent (CNA), etc
VAR-202008-0820 CVE-2020-3472 Cisco Webex Meetings Vulnerability regarding information leakage in CVSS V2: 4.0
CVSS V3: 5.0
Severity: MEDIUM
A vulnerability in the contacts feature of Cisco Webex Meetings could allow an authenticated, remote attacker with a legitimate user account to access sensitive information. The vulnerability is due to improper access restrictions on users who are added within user contacts. An attacker on one Webex Meetings site could exploit this vulnerability by sending specially crafted requests to the Webex Meetings site. A successful exploit could allow the attacker to view the details of users on another Webex site, including user names and email addresses. Cisco Webex Meetings There is an information leakage vulnerability in.Information may be obtained. Cisco Webex Meetings is a set of video conferencing solutions of Cisco (Cisco)