VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-199902-0004 CVE-1999-1375 NT use ASP and FSO Read server file vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
FileSystemObject (FSO) in the showfile.asp Active Server Page (ASP) allows remote attackers to read arbitrary files by specifying the name in the file parameter. FSO allows calls to be made utilizing "../" to exit the local directory path. An example of this syntax would be: http://www.server.foo/showfile.asp?file=../../global.asa This vulnerability could be used to view the source code of ASP files or stream data into other ASP files on the web server
VAR-199902-0042 CVE-1999-0362 WS_FTP Server service denial vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
WS_FTP server remote denial of service through cwd command. Issuing a CWD command (as a logged in user) with more than 876 characters will stop the Server from responding to FTP requests. There is a vulnerability in the WS_FTP server
VAR-199902-0043 CVE-1999-0363 S.u.S.E. 5.2 lpc Vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise. The PLP Line Printer Control program, shipped with S.u.S.E. 5.2 is vulnerable to a local remote buffer overflow. You can determine whether you're vulnerable or not by typing 'lpc'. If you're presented with an lpc version number, you're vulnerable. The consequences of lpc exploitation are root access for a local user
VAR-199902-0016 CVE-1999-1171 IPswitch WS_FTP Service privilege expansion vulnerability CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc. A security vulnerability exists in IPswitch WS_FTP
VAR-199901-0162 CVE-1999-0449 Microsoft IIS of ExAir Service disruption at the sample site (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. An IIS4 sample site "ExAir" has three ASP pages, that if called directly without having the sample site dlls running, will cause the server CPU to increase to 100%. These pages include: Exair - root/search/advsearch.asp Exair - root/search/query.asp Exair -root/search/search.asp
VAR-199901-0163 CVE-1999-0450 Microsoft IIS of ISAPI By extension Web Vulnerability where the root directory path information is leaked CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). Microsoft IIS Is ISAPI Mapped to extension by extension idq And .pl Files that do not actually exist GET Upon receiving the request, With error message Web A vulnerability exists that displays the absolute path of the root directory.You may get important information about your system. This can happen if the file is referenced as the target of the GET or passed in a variable to a script that looks for the file. Example: CGI Error The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are: Can't open perl script "C:\InetPub\scripts\ bogus.pl": No such file or directory
VAR-199901-0178 CVE-1999-1544 Microsoft IIS Buffer overflow vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Buffer overflow in FTP server in Microsoft IIS 3.0 and 4.0 allows local and sometimes remote attackers to cause a denial of service via a long NLST (ls) command. IIS is prone to a denial-of-service vulnerability
VAR-199912-0172 CVE-1999-1591 Microsoft VisualInterDev 6.0 - IIS4 No authentication management vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Microsoft Internet Information Services (IIS) server 4.0 SP4, without certain hotfixes released for SP4, does not require authentication credentials under certain conditions, which allows remote attackers to bypass authentication requirements, as demonstrated by connecting via Microsoft Visual InterDev 6.0. Microsoft Visual InterDev 6.0 client is prone to vulnerability that permits attackers to gain unauthorized access to the affected application. Reportedly, a Visual InterDev 6.0 client may be able to connect to an IIS4 Web Server and manage the website without requiring any user auhentication. This issue may be associated with security permissions applied by FrontPage tools. It is unclear exactly what is allowing this to happen or under what combination of Service Pack / hotfix this may occur
VAR-199901-0177 CVE-1999-1538 Microsoft IIS 4.0 Remotely Web management ism.dll Files can be exploited by brute force vulnerabilities CVSS V2: 2.1
CVSS V3: -
Severity: LOW
When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sensitive server information, including the Administrator's password. Web-based administration for IIS 4.0 is, by default, limited to the local loopback address, 127.0.0.1. In instances where IIS4.0 was installed as an upgrade to IIS 2.0 or 3.0, a legacy ISAPI DLL (ISM.DLL) is left in the /scripts/iisadmin directory. An attacker may call this DLL via the following syntax: http://www.server.com/scripts/iisadmin/ism.dll?http/dir This URL prompts the user for a username/password to access the remote administration console
VAR-199901-0048 CVE-1999-0063 Cisco IOS syslog Security hole CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. Vulnerabilities exist in Cisco IOS 12.0 and other releases
VAR-199901-0195 No CVE Cisco IOS Syslog Crash CVSS V2: -
CVSS V3: -
Severity: -
Cisco devices running classic IOS are reported prone to a denial of service vulnerability. The issue occurs when a vulnerable device receives and processes a UDP packet on UDP port 514 for syslog. This issue results in a crash or hang requiring a reboot. Vulnerable IOS software may be found on the following Cisco devices: - Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 8xx, ubr9xx, 1xxx, 25xx, 26xx, 30xx, 36xx, 38xx, 40xx, 45xx, 47xx, AS52xx, AS53xx, AS58xx, 64xx, 70xx, 72xx (including the ubr72xx), 75xx, and 12xxx series. -Recent versions of LS1010 ATM switch. -Catalyst 2900XL LAN switch. -Cisco DitributedDirector.
VAR-199901-0009 CVE-1999-1170 Progress Software IPswitch IMail Security hole CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc. Progress Software IPswitch IMail is an email server of Progress Software Company in the United States. A security vulnerability exists in Progress Software IPswitch IMail
VAR-202104-2088 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201902-0941 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201312-0597 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201312-0601 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201302-0422 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201008-0396 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-201108-0312 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-202012-1631 No CVE CVSS V2: -
CVSS V3: -
Severity: -