VARIoT IoT vulnerabilities database
VAR-200110-0334 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200609-1358 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200110-0351 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200110-0354 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200110-0362 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200609-1494 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-200609-1537 | No CVE |
CVSS V2: - CVSS V3: - Severity: - |
VAR-199809-0010 | CVE-1999-0897 | apple's iChat Server Vulnerability in |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack. apple's iChat Server Exists in unspecified vulnerabilities.None.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199809-0014 | CVE-1999-0162 | Cisco IOS Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering
VAR-199809-0009 | CVE-1999-0792 | ROUTERmate Configuration modification vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration
VAR-199808-0007 | CVE-1999-0158 | Cisco Systems Cisco Pix Firewall Software vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known. Cisco Systems Cisco Pix Firewall There are unspecified vulnerabilities in the software.None. PFM itself implements a Web Server with limited functions. PFM Web Server runs on Windows NT. There is a security hole in the URL request processing of PFM Web Server. A remote attacker may use this hole to read any file with a known file name on the system. The attacker must be able to establish a connection to the 8080/TCP port of the Windows NT host. In all recommended configurations and most actual configurations, the 8080/TCP port of the host where the PFM is located is only allowed to be accessed from the inside of the PIX firewall, not from the PIX Access from outside the firewall. Additionally, the attacker must know the exact path of the target file, and the vulnerability does not allow directory browsing
VAR-199808-0006 | CVE-1999-0157 | Cisco Systems Cisco IOS and Cisco Pix Firewall Software vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. Cisco Systems Cisco IOS and Cisco Pix Firewall There are unspecified vulnerabilities in the software.None
VAR-199808-0020 | No CVE | Cisco PIX and CBAC Fragmentation Attack |
CVSS V2: - CVSS V3: - Severity: - |
Both the Cisco PIX Firewall software as the Context-based Access Control (CBAC) feature of Cisco's IOS Firewall Feature Set do not properly check non-initial fragmented IP packets. Although the non-initial fragmented IP packets might belong to session which would normally be blocked, they are forwarded to the destination host. This may lead to a denial of services (DOS) attack due to the exhaustion of resources required to keep track of the fragmented IP packets.
The problem can be fixed by keeping track of the sessions that fragmented IP packets belong to and by blocking non-initial fragmented IP packets for which no initial packet has been seen.
The DOS attack can easily be carried out by publically available tools.
VAR-199808-0008 | CVE-1999-0159 | Cisco Systems Cisco IOS Vulnerability in |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. Cisco Systems Cisco IOS Exists in unspecified vulnerabilities.None
VAR-199808-0022 | No CVE | Cisco IOS Remote Router Crash |
CVSS V2: - CVSS V3: - Severity: - |
Cisco IOS software is reported prone to a remote denial of service vulnerability. This may allow an attacker to cause a vulnerable device to crash or hang. It is reported that this issue may cause damage to an internal data structure, which could lead to other problems as well. An attacker does not require authentication credentials to exploit this issue, as only access to the login prompt of a device is sufficient to trigger this issue.
VAR-199807-0030 | CVE-1999-1582 | PIX 'established' and 'conduit' command may have unexpected interactions |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality. A somewhat common configuration of Cisco PIX firewalls may permit a window of opportunity in which an intruder can bypass the firewall. This problem was first publicly described in July, 1998. Cisco Systems Cisco PIX Firewall Software Exists in unspecified vulnerabilities.None. PIX Firewall is prone to a remote security vulnerability
VAR-199807-0005 | CVE-1999-1436 | World Wide Web Authorization Gateway Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "user" parameter. Version 1.0 fails to eliminate characters with special meaning to the shell prior to executing a command. As a result, an attacker can utilize certain characters to execute arbitrary commands on a system remotely, as whatever user invoked the cgi-bin
VAR-199805-0007 | CVE-1999-1204 | Check Point Firewall Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator. Firewall-1 is prone to a remote security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199805-0016 | CVE-1999-0816 | Motorola CableRouter Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The Motorola CableRouter allows any remote user to connect to and configure the router on port 1024. Motorola Cablerouter is prone to a remote security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. The Motorola CableRouter is vulnerable
VAR-199805-0012 | CVE-1999-0919 | Motorola CableRouter Memory leak vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections. Motorola Cablerouter is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks