VARIoT news about IoT security
Trust: 5.25 Fetched: Jan. 21, 2026, 10:06 a.m., Published: March 8, 2026, midnight | Vulnerabilities: path traversal, cross-site scripting, improper validation... |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 4.5 Fetched: Jan. 21, 2026, 10:06 a.m., Published: July 18, 2025, 12:25 p.m. | Vulnerabilities: code execution, sql injection, restriction bypass |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
|
Trust: 3.5 Fetched: Jan. 21, 2026, 10:03 a.m., Published: Jan. 21, 2024, midnight | Vulnerabilities: code execution, privilege escalation, memory corruption |
| Affected products | External IDs | ||||||||||||||||||||
|
Trust: 3.5 Fetched: Jan. 21, 2026, 10:03 a.m., Published: Jan. 13, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Jan. 21, 2026, 10:02 a.m., Published: Dec. 30, 2025, 7:30 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Jan. 21, 2026, 10:01 a.m., Published: Jan. 16, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Jan. 21, 2026, 9:55 a.m., Published: Jan. 20, 2026, 4:21 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.75 Fetched: Jan. 21, 2026, 9:54 a.m., Published: Jan. 20, 2026, 3:13 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-201404-0592 Trust: 5.75 Fetched: Jan. 21, 2026, 9:53 a.m., Published: Jan. 3, 2026, midnight | Vulnerabilities: resource exhaustion, denial of service, information disclosure |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.0 Fetched: Jan. 21, 2026, 9:51 a.m., Published: Jan. 17, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201404-0592 Trust: 5.75 Fetched: Jan. 21, 2026, 9:50 a.m., Published: Jan. 19, 2026, 9:43 a.m. | Vulnerabilities: resource exhaustion, denial of service, information disclosure |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.5 Fetched: Jan. 21, 2026, 9:44 a.m., Published: Jan. 19, 2026, 2:18 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
Trust: 3.75 Fetched: Jan. 21, 2026, 9:44 a.m., Published: Jan. 20, 2026, 3:16 a.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 6.0 Fetched: Jan. 21, 2026, 9:42 a.m., Published: Jan. 20, 2026, 11:41 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.75 Fetched: Jan. 21, 2026, 9:42 a.m., Published: Jan. 20, 2026, 5:15 a.m. | Vulnerabilities: code execution, sql injection, privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Jan. 21, 2026, 9:41 a.m., Published: Jan. 20, 2026, 4:27 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.0 Fetched: Jan. 21, 2026, 9:40 a.m., Published: Jan. 3, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.25 Fetched: Jan. 21, 2026, 9:39 a.m., Published: Jan. 15, 2026, midnight | Vulnerabilities: code execution, memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Jan. 21, 2026, 9:36 a.m., Published: Jan. 20, 2026, 6:32 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: Jan. 21, 2026, 9:35 a.m., Published: Jan. 26, 2026, midnight | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|