VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-199912-0029 CVE-1999-1126 Cisco Resource Manager Permission permission vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_". Cisco Resource Manager is prone to a local security vulnerability. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. CRM will create a file with unsafe permissions, local users can get sensitive from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug
VAR-199912-0019 CVE-1999-1175 Cisco IOS Cisco Cache Engine Web Cache Control Protocol (WCCP) User Path Reset Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048. Cisco IOS is prone to a remote security vulnerability. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. A remote attacker can reset arbitrary user access to HTTP through UDP port 2048 of WCCP packets
VAR-199912-0033 CVE-1999-1464 Cisco IOS Access control vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564. IOS is prone to a security bypass vulnerability. This vulnerability is also known as Cisco vulnerability CSCdk35564
VAR-199912-0034 CVE-1999-1465 Cisco IOS switching ( DFS Permission permission and access control CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862. IOS is prone to a security bypass vulnerability. Cisco IOS 11.1 to 11.3's distributed fast switching (DFS) has a vulnerability
VAR-199912-0038 CVE-1999-1476 Intel Pentium processor (MMX and Overdrive) Denial of service vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the "Invalid Operand with Locked CMPXCHG8B Instruction" problem. There are loopholes in Intel Pentium processor (MMX and Overdrive)
VAR-199912-0023 CVE-1999-1102 SGI  of  IRIX  Vulnerabilities in products from multiple vendors such as CVSS V2: 2.1
CVSS V3: -
Severity: LOW
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. SGI of IRIX Unspecified vulnerabilities exist in products from multiple vendors.None. SunOS is prone to a local security vulnerability. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems have the lpr vulnerability
VAR-199912-0051 CVE-1999-1223 IIS Denial of service vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IIS 3.0 allows remote attackers to cause a denial of service via a request to an ASP page in which the URL contains a large number of / (forward slash) characters. IIS is prone to a denial-of-service vulnerability
VAR-199912-0002 CVE-1999-1451 IIS and Site Server Winmsdp.exe Sample File Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files. Site Server is prone to a remote security vulnerability
VAR-199912-0110 CVE-1999-0154 Microsoft Internet Information Services Security hole CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL. IIS is prone to a remote security vulnerability. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0053 CVE-1999-1148 IIS FTP Service denial vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time. IIS is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition
VAR-199912-0159 CVE-2000-0041 apple's  macOS  Vulnerability in CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack. apple's macOS Exists in unspecified vulnerabilities.None. The implementation of Open Transport in MacOS 9 includes a weakness that could allow an attacker to use the Mac as a traffic amplifier in a DoS attack against another computer. A specially-crafted 29-byte UDP packet can be sent to a machine running MacOS 9. The Mac will then respond with a 1500 byte ICMP packet. If the first UDP packet is sent with a spoofed IP address of a third machine, and these spoofed triggger packets are sent to several MacOS 9 machines,, it will create an effective DoS of the third machine due to bandwidth starvation. There are a large number of ICMP datagram vulnerabilities in the Macintosh system. Attackers use these vulnerabilities as amplifiers to carry out attacks
VAR-199912-0149 CVE-2000-0119 Virus Scanning Recycle Bin Exclusions for Multiple Vendors CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection. Many commercial virus scanners for Windows platforms exclude the Recycled folder on the hard drive from their scans. The Recycled folder is where Win9x operating systems keep files that have been deleted via the GUI but not purged from the Recycle Bin. Files of any nature can be manually placed in the Recycled folder. Therefore, it is possible for any user or program to put code into that folder that will never be subject to virus scans. Although WinNT makes use of a folder called 'Recycler' for similar purposes, many virus scanners for NT still have the 'Recycled' folder listed in the exclusions. Note that other virus scanners than those listed under the 'info' tab may be vulnerable as well. document
VAR-199912-0194 CVE-2000-0024 Microsoft IIS Authentication avoidance vulnerability in handling escape characters CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability. IIS accepts escaped characters that are not valid hexadecimal digits. All webservers that are compliant with RFC 1738 accept hexadecimal digits that are preceded by a percent sign, but IIS will also accept invalid hex digits and translate some of them into valid ASCII characters. This provides a third means of constructing URLs (plaintext, valid hex, and invalid hex) that may be used to bypass third-party access control mechanisms and intrusion detection systems. This issue does not provide a means of compromising the IIS server itself
VAR-199912-0146 CVE-1999-1497 IMail Weak Password Encryption Vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. The encryption scheme used is weak and has been broken. The following description of the mechanism used is quoted from Matt Conover's post to Bugtraq, linked to in full in the Credits section. ENCRYPTION SCHEME Take the lowercase of the account name, split it up by letter and convert each letter to its ASCII equivalent. Next, find the difference between each letter and the first letter. Take each letter of the password, find it's ASCII equivalent and add the offset (ASCII value of first char of the account name minus 97) then subtract the corresponding difference. Use the differences recursively if the password length is greater than the length of the account name. This gives you the character's new ASCII value. Next, Look it up the new ASCII value in the ASCII-ENCRYPTED table (see http://www.w00w00.org/imail_map.txt) and you now have the encrypted letter. Example: Account Name: mike m = 109 i = 105 k = 107 e = 101 Differences: First - First: 0 First - Second: 4 First - Third: 2 First - Fourth: 8 Unencrypted Password: rocks r = 114 o = 111 c = 99 k = 107 s = 115 (ASCII value + offset) - difference: offset: (109 - 97) = 12 (114 + 12) - 0 = 126 (111 + 12) - 4 = 119 (99 + 12) - 2 = 109 (107 + 12) - 8 = 111 (115 + 12) - 0 = 127 126 = DF 119 = D8 109 = CE 111 = D0 127 = E0 Encrypted Password: DFD8CED0E0 The decryption scheme is a little easier. First, like the encryption scheme, take the account name, split it up by letter and convert each letter to its ASCII equivalent. Next, find the difference between each letter and the first letter. Now split the encrypted password by two characters (e.g., EFDE = EF DE) then look up their ASCII equivalent within the ASCII-ENCRYPTED table (see http://www.w00w00.org/imail_map.txt). Take that ASCII value and add the corresponding difference.Look this value up in the ascii table. This table is made by taking the ASCII value of the first character of the account name and setting it equal to 'a'. EXAMPLE Account Name: mike m = 109 i = 105 k = 107 e = 101 Differences: First - First: 0 First - Second: 4 First - Third: 2 First - Fourth: 8 Encrypted Password: DFD8CED0E0 DF = 126 D8 = 119 CE = 109 D0 = 111 E0 = 127 Add Difference: 126 + 0 = 126 119 + 4 = 123 109 + 2 = 111 111 + 8 = 119 127 + 0 = 127 Look up in table (see http://www.w00w00.org/imail_map.txt): 126 = r 123 = o 111 = c 119 = k 127 = s Unencrypted Password: rocks
VAR-199912-0073 CVE-1999-0998 Cisco Security hole CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Cache Engine allows an attacker to replace content in the cache. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0074 CVE-1999-1000 Cisco Cache Engine Security hole CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0075 CVE-1999-1001 Cisco Security hole CVSS V2: 2.6
CVSS V3: -
Severity: LOW
Cisco Cache Engine allows a remote attacker to gain access via a null username and password. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0077 CVE-1999-1004 Norton Anti-Virus protection NAV2000 program POP server POProxy Buffer overflow vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command. The vulnerability is caused by a large USER command
VAR-199912-0163 CVE-2000-0068 Intel InBusiness Email station daynad Program authorization problem vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail. InBusiness eMail Station is prone to a remote security vulnerability. Vulnerability in the daynad program of Intel's InBusiness e-mail site
VAR-199911-0070 CVE-1999-1548 Cabletron SSR ARP Flood DoS Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x can only handle 200 ARP requests per second allowing a denial of service attack to succeed with a flood of ARP requests exceeding that limit. There is a vulnerability in Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x