VARIoT news about IoT security
Trust: 3.75 Fetched: Feb. 19, 2025, 9:07 a.m., Published: Feb. 11, 2025, 2:55 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 3.0 Fetched: Feb. 18, 2025, 9:26 a.m., Published: Feb. 18, 3540, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 3.25 Fetched: Feb. 18, 2025, 9:25 a.m., Published: Feb. 18, 7865, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 18, 2025, 9:25 a.m., Published: Feb. 18, 3890, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 18, 2025, 9:25 a.m., Published: Feb. 18, 7865, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 18, 2025, 9:21 a.m., Published: Jan. 24, 2025, midnight | Vulnerabilities: information exposure, denial of service, access control problem |
| Affected products | External IDs | ||||||||||||
|
Trust: 3.75 Fetched: Feb. 18, 2025, 9:20 a.m., Published: Feb. 12, 2025, 8:43 a.m. | Vulnerabilities: code injection, buffer overflow |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Feb. 18, 2025, 9:17 a.m., Published: Jan. 22, 2025, 2:13 p.m. | Vulnerabilities: improper access control |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 18, 2025, 9:15 a.m., Published: Feb. 3, 2025, midnight | Vulnerabilities: denial of service, weak password, cross-site scripting... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 4.0 Fetched: Feb. 18, 2025, 9:14 a.m., Published: Jan. 29, 2025, 6:50 a.m. | Vulnerabilities: privilege escalation, command injection |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 18, 2025, 9:12 a.m., Published: Feb. 14, 2025, midnight | Vulnerabilities: request forgery, cross-site request forgery, symbolic link attack... |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 18, 2025, 9:11 a.m., Published: Feb. 10, 2025, 7:36 a.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 18, 2025, 9:10 a.m., Published: Feb. 13, 2025, midnight | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.5 Fetched: Feb. 18, 2025, 9:10 a.m., Published: Jan. 28, 2025, 4:38 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: Feb. 18, 2025, 9:09 a.m., Published: Feb. 5, 2025, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202502-0112,
VAR-202502-0123,
VAR-202502-0124,
VAR-202501-1996,
VAR-202502-0189,
VAR-202210-0428,
VAR-202502-0263,
VAR-202502-0246,
VAR-202502-0188,
VAR-202502-0237,
VAR-202502-0122,
VAR-202501-2383,
VAR-202502-0191,
VAR-202502-0190,
VAR-202502-0121,
VAR-202502-0199,
VAR-202502-0219 Trust: 5.5 Fetched: Feb. 18, 2025, 9:08 a.m., Published: Feb. 14, 2025, 1:35 p.m. | Vulnerabilities: authentication flaw, os command injection, privilege escalation... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.5 Fetched: Feb. 18, 2025, 9:08 a.m., Published: Feb. 12, 2025, 5 p.m. | Vulnerabilities: command injection, os command injection |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 4.25 Fetched: Feb. 18, 2025, 9:07 a.m., Published: May 18, 2025, midnight | Vulnerabilities: memory corruption, code execution |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: Feb. 18, 2025, 9:06 a.m., Published: Feb. 17, 2025, 12:42 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.25 Fetched: Feb. 16, 2025, 9:34 a.m., Published: Feb. 15, 2025, 5:37 p.m. | Vulnerabilities: command injection, injection attack |
| Affected products | External IDs | ||||||||||||||||
|
|