VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-202109-1929, VAR-202105-0410, VAR-202206-1471, VAR-202012-1385, VAR-202202-0242, VAR-202004-1858, VAR-202206-1472, VAR-201905-0710, VAR-201905-1046, VAR-202106-1998, VAR-201807-1861, VAR-202011-1296, VAR-202202-0239, VAR-201807-1871, VAR-202112-2011, VAR-202012-0814, VAR-202011-1295, VAR-202303-1297, VAR-201807-1849, VAR-201908-0705, VAR-202012-1384, VAR-201910-0580, VAR-202207-1552, VAR-202301-2271, VAR-202011-1276, VAR-201910-0582, VAR-202012-1378, VAR-202105-0407, VAR-202006-1539, VAR-202106-0547, VAR-202103-0444, VAR-202304-1259, VAR-202006-1543, VAR-202303-1354, VAR-202203-0236, VAR-202206-1465, VAR-201905-1030, VAR-202012-1391, VAR-202202-1170, VAR-202406-0247, VAR-202105-1269, VAR-202108-0211, VAR-202009-0319, VAR-202003-1446, VAR-202211-1344, VAR-202112-0562, VAR-202009-0596, VAR-202206-1470, VAR-202102-0527, VAR-201811-0568, VAR-202012-1387, VAR-202003-0430, VAR-201807-1867, VAR-202008-1036, VAR-202105-0411, VAR-202302-1810, VAR-202105-0416, VAR-201905-0030, VAR-202006-1536, VAR-202301-2352, VAR-202301-2353, VAR-202106-0543, VAR-201807-1862, VAR-202003-1445, VAR-202006-1532, VAR-202009-1314, VAR-202202-0246, VAR-201909-0044, VAR-202107-0332, VAR-202011-1273, VAR-202206-1785, VAR-202006-1537, VAR-202106-0529, VAR-202106-0540, VAR-202012-0816, VAR-202202-0286, VAR-202105-0855, VAR-202202-0285, VAR-202211-1389, VAR-202006-1544, VAR-202107-0329, VAR-202012-0125, VAR-202008-0248, VAR-202009-0304, VAR-202011-1292, VAR-201908-0713, VAR-202009-0303, VAR-201905-1034, VAR-202106-0538, VAR-202303-1371, VAR-202011-1278, VAR-202011-1293, VAR-202008-1034, VAR-202011-1286, VAR-201905-1047, VAR-202106-1938, VAR-202011-0885, VAR-202308-2035, VAR-202406-0299, VAR-202011-1274, VAR-202106-0530, VAR-202103-0445, VAR-202009-1311, VAR-202107-0308, VAR-202012-0817, VAR-202202-0238, VAR-202106-1996, VAR-202105-1032, VAR-202108-0212, VAR-202006-1541, VAR-202006-1533, VAR-201909-0046, VAR-202106-0541, VAR-202105-0846, VAR-202106-0544, VAR-202106-0546, VAR-202202-1169, VAR-202304-1280, VAR-202011-0845, VAR-201512-0029, VAR-202006-1542, VAR-201905-0029, VAR-201905-1028, VAR-201905-1248, VAR-202011-1288, VAR-202203-0237, VAR-202203-0230, VAR-201909-0045, VAR-202202-0248, VAR-202106-0533, VAR-202108-0801, VAR-202112-1782, VAR-202112-0566, VAR-202106-0536, VAR-201812-0849, VAR-202011-1294, VAR-202203-0231, VAR-202011-1289, VAR-202203-0235, VAR-202011-1279, VAR-202105-0415, VAR-202006-1540, VAR-202105-0419, VAR-201807-1866, VAR-202407-0346, VAR-202206-1466, VAR-202202-1217, VAR-202006-1523, VAR-201807-1863, VAR-202011-1287, VAR-202004-1860, VAR-202011-1290, VAR-202106-0534, VAR-202011-1277, VAR-202303-1298, VAR-202102-0529, VAR-201905-1032, VAR-202006-1535, VAR-201909-0049, VAR-202105-0408, VAR-202009-1545, VAR-202305-2074, VAR-202103-0440, VAR-202103-0443, VAR-201908-0706, VAR-202106-0531, VAR-202103-0441, VAR-202103-0442, VAR-202202-0249, VAR-201905-1035, VAR-202012-1379, VAR-202012-0820, VAR-201905-1027, VAR-202106-0532, VAR-201910-0576, VAR-201909-0998, VAR-201807-1869, VAR-201905-1029, VAR-202202-0295, VAR-202001-1872, VAR-202009-1544, VAR-202406-0502, VAR-201812-0848, VAR-202207-1551, VAR-201908-0702, VAR-202105-0418, VAR-201805-1140, VAR-202105-0417, VAR-202105-0414, VAR-201804-1269, VAR-202206-1467, VAR-202011-1291, VAR-202202-0288, VAR-202109-0204, VAR-201905-1031, VAR-201811-0565, VAR-201804-1275, VAR-202105-0413, VAR-202106-0535, VAR-202004-0062, VAR-201807-1864, VAR-202202-0283, VAR-202304-1416, VAR-202202-0404, VAR-202106-1999, VAR-202004-1857, VAR-201905-1036, VAR-202107-0328, VAR-202007-1245, VAR-201807-1865, VAR-202303-1424, VAR-202109-0206, VAR-202304-1279, VAR-202003-1447, VAR-201905-0042, VAR-202003-1441, VAR-202202-0240, VAR-202301-1957, VAR-202008-1030, VAR-202202-0247, VAR-202003-1443, VAR-201908-0701, VAR-202105-0412, VAR-202006-1538, VAR-202303-1353, VAR-202201-0617, VAR-202012-0815, VAR-201910-0579, VAR-202106-0539, VAR-202202-0245, VAR-202003-1440, VAR-201908-0699, VAR-202101-0073, VAR-202202-0284, VAR-201908-0703, VAR-201909-0039, VAR-202109-1928, VAR-202302-0001, VAR-202008-1032, VAR-201908-0704, VAR-202106-0537, VAR-202009-1312, VAR-202008-1033, VAR-202202-0244, VAR-202107-0330, VAR-202106-0639, VAR-201905-0711, VAR-202201-0616, VAR-202107-0331, VAR-201905-1037, VAR-202011-1275, VAR-202311-0697, VAR-202303-1538, VAR-202109-1974, VAR-201905-1045, VAR-201908-0715, VAR-202301-2015, VAR-201811-0569, VAR-202012-0819, VAR-201910-0577, VAR-202001-1803, VAR-201807-1872, VAR-201910-0574, VAR-202107-1010, VAR-202107-0307, VAR-202206-1567, VAR-201909-0084, VAR-202303-1372, VAR-202204-0257, VAR-201910-0581, VAR-202202-0243, VAR-202009-1313, VAR-202106-0542, VAR-202304-1397, VAR-202006-1534, VAR-202206-1468, VAR-202011-0884, VAR-201811-0566, VAR-201811-0567, VAR-202008-1031, VAR-201812-0851, VAR-202105-0848, VAR-202108-1051, VAR-201910-0575, VAR-201905-1039, VAR-202207-1550, VAR-202109-0202, VAR-202202-1215, VAR-201807-1850, VAR-202011-1297, VAR-202004-1859, VAR-202003-1444, VAR-202106-0528, VAR-202012-0818, VAR-201807-1868, VAR-201905-1038, VAR-202106-0545, VAR-201910-0583, VAR-202108-0213, VAR-201905-0709, VAR-201807-1870, VAR-202102-0528, VAR-202109-0207, VAR-202002-1458, VAR-202202-1167, VAR-201908-0712, VAR-202202-0241, VAR-202209-0597, VAR-202202-1168, VAR-201908-0714, VAR-202106-1997, VAR-201804-1268, VAR-202012-1389, VAR-202109-0203, VAR-202003-1448, VAR-202206-1469

Trust: 5.25

Fetched: Sept. 27, 2024, 9:31 a.m., Published: Sept. 10, 2024, midnight
Vulnerabilities: privilege management vulnerability, code injection, path element vulnerability...
Affected productsExternal IDs
vendor: clearscada model: clearscada
vendor: wibu-systems model: codemeter
vendor: aveva model: clearscada
vendor: aveva model: intouch
vendor: pactware model: pactware
vendor: pactware model: service pack
vendor: pro-face model: gp-pro ex
vendor: wibu model: codemeter
vendor: schneider electric model: clearscada
vendor: schneider electric model: bmxnoe0110h
vendor: schneider electric model: m340
vendor: schneider electric model: quantum plcs
vendor: schneider electric model: bmxnor0200
vendor: schneider electric model: powerscada expert
vendor: schneider electric model: tsxp574634
vendor: schneider electric model: powerlogic egx100
vendor: schneider electric model: apc network management card
vendor: schneider electric model: modicon bmxcra
vendor: schneider electric model: easergy t300
vendor: schneider electric model: pacdrive eco
vendor: schneider electric model: modicon lmc078
vendor: schneider electric model: hmigtu
vendor: schneider electric model: opc factory server
vendor: schneider electric model: igss
vendor: schneider electric model: powerchute
vendor: schneider electric model: hmigto
vendor: schneider electric model: quantum cpus
vendor: schneider electric model: bmxnoc0401
vendor: schneider electric model: premium cpus
vendor: schneider electric model: powerlogic ion8650
vendor: schneider electric model: modicon m218
vendor: schneider electric model: accutech manager
vendor: schneider electric model: andover continuum
vendor: schneider electric model: tsxety4103
vendor: schneider electric model: powerlogic pm8000
vendor: schneider electric model: prosoft configurator
vendor: schneider electric model: evlink parking
vendor: schneider electric model: bmxnor0200h
vendor: schneider electric model: hmistu
vendor: schneider electric model: ecostruxure machine expert
vendor: schneider electric model: somachine
vendor: schneider electric model: hmisto
vendor: schneider electric model: modicon m258 firmware
vendor: schneider electric model: premium communication modules
vendor: schneider electric model: bmxnoe0100h
vendor: schneider electric model: m340 cpus
vendor: schneider electric model: struxureware data center
vendor: schneider electric model: m580
vendor: schneider electric model: modicon m218 firmware
vendor: schneider electric model: modicon bmenoc 0321
vendor: schneider electric model: bmxp342020
vendor: schneider electric model: tsxp576634
vendor: schneider electric model: plc simulator
vendor: schneider electric model: schneider electric software update
vendor: schneider electric model: bmxpra0100
vendor: schneider electric model: bmxnoe0100
vendor: schneider electric model: bmxp342020h
vendor: schneider electric model: modicon m241
vendor: schneider electric model: modicon m100
vendor: schneider electric model: modicon quantum
vendor: schneider electric model: tsxety5103
vendor: schneider electric model: ion8650
vendor: schneider electric model: xbtgh
vendor: schneider electric model: interactive graphical scada system
vendor: schneider electric model: unity loader
vendor: schneider electric model: modicon m340
vendor: schneider electric model: scadapack
vendor: schneider electric model: apc easy ups on-line
vendor: schneider electric model: u.motion builder software
vendor: schneider electric model: xbtgt
vendor: schneider electric model: bmxp3420302h
vendor: schneider electric model: modicon m580
vendor: schneider electric model: homelynk
vendor: schneider electric model: modbus
vendor: schneider electric model: ecostruxure control expert
vendor: schneider electric model: hmiscu
vendor: schneider electric model: scadapack 7x remote connect
vendor: schneider electric model: tsxp575634
vendor: schneider electric model: premium
vendor: schneider electric model: powerlogic ion7400
vendor: schneider electric model: modbus serial driver
vendor: schneider electric model: schneider electric spacelynk
vendor: schneider electric model: 140noe77111
vendor: schneider electric model: ion8800
vendor: schneider electric model: pro-face gp-pro ex
vendor: schneider electric model: powerchute business edition
vendor: schneider electric model: control expert
vendor: schneider electric model: somachine basic
vendor: schneider electric model: modicon bmenoc 0311
vendor: schneider electric model: spacelynk
vendor: schneider electric model: connexium
vendor: schneider electric model: bmxp342030
vendor: schneider electric model: vijeo designer basic
vendor: schneider electric model: struxureware data center expert
vendor: schneider electric model: modicon premium
vendor: schneider electric model: u.motion builder
vendor: schneider electric model: modicon m258
vendor: schneider electric model: floating license manager
vendor: schneider electric model: easergy t300 firmware
vendor: schneider electric model: modicon m340 bmxnoe0100
vendor: schneider electric model: powerlogic ion9000
vendor: schneider electric model: u.motion
vendor: schneider electric model: bmxp3420302
vendor: schneider electric model: somove
vendor: schneider electric model: bmxnoe0110
vendor: schneider electric model: gp-pro ex
vendor: schneider electric model: hmigxo
vendor: schneider electric model: apc easy ups online
vendor: schneider electric model: vijeo designer
vendor: schneider electric model: hmigxu
vendor: schneider electric model: quantum communication modules
vendor: schneider electric model: sage rtu
vendor: schneider electric model: software update
vendor: schneider electric model: somachine motion
vendor: schneider electric model: sesu
vendor: schneider electric model: unity pro
vendor: schneider electric model: powerlogic pm8ecc
vendor: schneider electric model: bmx p34x
vendor: schneider model: clearscada
vendor: schneider model: bmxnoe0110h
vendor: schneider model: m340
vendor: schneider model: quantum plcs
vendor: schneider model: bmxnor0200
vendor: schneider model: powerscada expert
vendor: schneider model: tsxp574634
vendor: schneider model: powerlogic egx100
vendor: schneider model: apc network management card
vendor: schneider model: modicon bmxcra
vendor: schneider model: easergy t300
vendor: schneider model: pacdrive eco
vendor: schneider model: modicon lmc078
vendor: schneider model: hmigtu
vendor: schneider model: opc factory server
vendor: schneider model: igss
vendor: schneider model: powerchute
vendor: schneider model: hmigto
vendor: schneider model: quantum cpus
vendor: schneider model: bmxnoc0401
vendor: schneider model: premium cpus
vendor: schneider model: powerlogic ion8650
vendor: schneider model: modicon m218
vendor: schneider model: accutech manager
vendor: schneider model: andover continuum
vendor: schneider model: tsxety4103
vendor: schneider model: powerlogic pm8000
vendor: schneider model: prosoft configurator
vendor: schneider model: evlink parking
vendor: schneider model: bmxnor0200h
vendor: schneider model: hmistu
vendor: schneider model: ecostruxure machine expert
vendor: schneider model: somachine
vendor: schneider model: hmisto
vendor: schneider model: modicon m258 firmware
vendor: schneider model: premium communication modules
vendor: schneider model: bmxnoe0100h
vendor: schneider model: m340 cpus
vendor: schneider model: struxureware data center
vendor: schneider model: m580
vendor: schneider model: modicon m218 firmware
vendor: schneider model: modicon bmenoc 0321
vendor: schneider model: bmxp342020
vendor: schneider model: tsxp576634
vendor: schneider model: plc simulator
vendor: schneider model: schneider electric software update
vendor: schneider model: bmxpra0100
vendor: schneider model: bmxnoe0100
vendor: schneider model: bmxp342020h
vendor: schneider model: modicon m241
vendor: schneider model: modicon m100
vendor: schneider model: modicon quantum
vendor: schneider model: tsxety5103
vendor: schneider model: ion8650
vendor: schneider model: xbtgh
vendor: schneider model: interactive graphical scada system
vendor: schneider model: unity loader
vendor: schneider model: modicon m340
vendor: schneider model: scadapack
vendor: schneider model: apc easy ups on-line
vendor: schneider model: u.motion builder software
vendor: schneider model: xbtgt
vendor: schneider model: bmxp3420302h
vendor: schneider model: modicon m580
vendor: schneider model: homelynk
vendor: schneider model: modbus
vendor: schneider model: ecostruxure control expert
vendor: schneider model: hmiscu
vendor: schneider model: scadapack 7x remote connect
vendor: schneider model: tsxp575634
vendor: schneider model: premium
vendor: schneider model: powerlogic ion7400
vendor: schneider model: modbus serial driver
vendor: schneider model: schneider electric spacelynk
vendor: schneider model: 140noe77111
vendor: schneider model: ion8800
vendor: schneider model: pro-face gp-pro ex
vendor: schneider model: powerchute business edition
vendor: schneider model: control expert
vendor: schneider model: somachine basic
vendor: schneider model: modicon bmenoc 0311
vendor: schneider model: spacelynk
vendor: schneider model: connexium
vendor: schneider model: bmxp342030
vendor: schneider model: vijeo designer basic
vendor: schneider model: struxureware data center expert
vendor: schneider model: modicon premium
vendor: schneider model: u.motion builder
vendor: schneider model: modicon m258
vendor: schneider model: floating license manager
vendor: schneider model: easergy t300 firmware
vendor: schneider model: modicon m340 bmxnoe0100
vendor: schneider model: powerlogic ion9000
vendor: schneider model: u.motion
vendor: schneider model: bmxp3420302
vendor: schneider model: somove
vendor: schneider model: bmxnoe0110
vendor: schneider model: gp-pro ex
vendor: schneider model: hmigxo
vendor: schneider model: apc easy ups online
vendor: schneider model: vijeo designer
vendor: schneider model: hmigxu
vendor: schneider model: quantum communication modules
vendor: schneider model: sage rtu
vendor: schneider model: software update
vendor: schneider model: somachine motion
vendor: schneider model: sesu
vendor: schneider model: unity pro
vendor: schneider model: powerlogic pm8ecc
vendor: schneider model: bmx p34x
vendor: codesys model: gateway
vendor: codesys model: development system
vendor: codesys model: control
vendor: codesys model: runtime
vendor: codesys model: web server
vendor: codesys model: codesys
db: NVD ids: CVE-2021-22795, CVE-2024-37037, CVE-2021-22732, CVE-2020-7518, CVE-2020-7515, CVE-2022-32522, CVE-2020-7496, CVE-2020-7560, CVE-2022-24311, CVE-2020-7488, CVE-2022-32527, CVE-2021-22727, CVE-2020-11896, CVE-2023-5399, CVE-2020-7533, CVE-2021-22721, CVE-2018-12127, CVE-2023-29411, CVE-2018-7843, CVE-2020-25178, CVE-2018-7763, CVE-2020-0601, CVE-2020-7561, CVE-2022-24321, CVE-2020-7494, CVE-2020-7548, CVE-2020-7569, CVE-2018-7773, CVE-2020-11908, CVE-2021-44832, CVE-2023-1049, CVE-2020-28214, CVE-2022-34759, CVE-2021-22824, CVE-2020-7559, CVE-2021-22747, CVE-2023-27980, CVE-2020-11907, CVE-2023-28003, CVE-2022-32515, CVE-2018-7776, CVE-2019-12264, CVE-2020-7549, CVE-2022-34757, CVE-2022-32514, CVE-2020-0610, CVE-2019-6847, CVE-2022-2463, CVE-2022-32516, CVE-2021-22804, CVE-2021-22706, CVE-2020-7565, CVE-2022-34753, CVE-2019-6849, CVE-2020-7542, CVE-2022-30790, CVE-2021-22699, CVE-2024-0865, CVE-2020-7508, CVE-2021-22769, CVE-2021-22713, CVE-2022-32518, CVE-2023-25620, CVE-2022-38138, CVE-2024-2050, CVE-2022-32748, CVE-2023-6032, CVE-2020-7512, CVE-2020-7517, CVE-2023-27981, CVE-2021-22783, CVE-2021-21864, CVE-2022-22813, CVE-2022-22806, CVE-2024-0568, CVE-2020-11901, CVE-2022-42973, CVE-2022-32524, CVE-2021-22802, CVE-2021-22784, CVE-2018-7848, CVE-2020-11898, CVE-2020-1020, CVE-2021-22708, CVE-2020-7540, CVE-2022-32520, CVE-2021-22788, CVE-2021-22716, CVE-2024-5560, CVE-2021-31166, CVE-2020-35683, CVE-2020-14513, CVE-2019-0803, CVE-2022-34756, CVE-2020-7480, CVE-2022-37301, CVE-2021-45046, CVE-2022-42970, CVE-2022-41670, CVE-2020-7514, CVE-2020-16233, CVE-2020-11903, CVE-2022-32526, CVE-2021-22701, CVE-2020-11910, CVE-2018-7830, CVE-2023-37196, CVE-2022-0221, CVE-2020-7535, CVE-2022-30237, CVE-2021-22723, CVE-2020-10245, CVE-2018-7769, CVE-2020-7527, CVE-2019-1182, CVE-2021-22733, CVE-2020-7516, CVE-2024-37039, CVE-2023-0595, CVE-2021-22738, CVE-2019-6808, CVE-2020-11911, CVE-2020-7505, CVE-2023-22611, CVE-2023-25548, CVE-2023-22610, CVE-2021-22765, CVE-2018-7764, CVE-2022-4046, CVE-2020-7479, CVE-2021-21868, CVE-2020-7501, CVE-2020-7531, CVE-2020-7498, CVE-2020-0609, CVE-2022-24310, CVE-2019-6828, CVE-2021-30063, CVE-2021-22782, CVE-2021-22812, CVE-2020-7562, CVE-2021-21814, CVE-2022-32530, CVE-2021-22793, CVE-2021-22786, CVE-2020-7506, CVE-2021-22810, CVE-2020-7536, CVE-2020-7541, CVE-2021-22751, CVE-2023-5629, CVE-2020-6996, CVE-2021-22762, CVE-2021-22719, CVE-2020-7547, CVE-2020-9404, CVE-2023-28355, CVE-2020-28216, CVE-2023-5987, CVE-2023-29412, CVE-2023-29413, CVE-2022-22809, CVE-2022-32521, CVE-2020-7493, CVE-2020-9403, CVE-2024-2602, CVE-2023-6409, CVE-2021-30195, CVE-2022-22731, CVE-2022-22811, CVE-2024-5559, CVE-2022-0222, CVE-2023-2161, CVE-2020-7572, CVE-2023-6408, CVE-2020-7513, CVE-2021-22779, CVE-2020-13987, CVE-2020-1472, CVE-2022-22804, CVE-2020-14519, CVE-2020-7556, CVE-2020-7573, CVE-2021-22726, CVE-2019-12256, CVE-2020-11905, CVE-2020-14515, CVE-2018-7852, CVE-2023-25552, CVE-2021-22760, CVE-2023-27979, CVE-2020-7567, CVE-2022-34754, CVE-2020-7557, CVE-2020-7525, CVE-2020-7550, CVE-2020-27336, CVE-2018-7844, CVE-2021-22744, CVE-2020-28210, CVE-2020-25182, CVE-2020-28213, CVE-2021-22808, CVE-2023-3001, CVE-2021-22813, CVE-2023-3953, CVE-2024-5557, CVE-2020-7563, CVE-2021-22752, CVE-2021-22725, CVE-2022-4224, CVE-2023-25556, CVE-2022-34762, CVE-2021-22714, CVE-2020-7528, CVE-2021-22771, CVE-2021-22730, CVE-2020-28217, CVE-2023-5402, CVE-2022-24319, CVE-2022-32747, CVE-2020-25176, CVE-2021-29241, CVE-2019-1181, CVE-2021-22799, CVE-2021-30065, CVE-2020-35684, CVE-2020-7510, CVE-2020-7502, CVE-2024-37038, CVE-2019-6830, CVE-2021-22763, CVE-2021-30066, CVE-2021-30186, CVE-2021-22766, CVE-2021-22768, CVE-2021-22787, CVE-2024-5680, CVE-2021-21829, CVE-2020-11900, CVE-2023-1548, CVE-2020-28211, CVE-2015-7937, CVE-2020-7511, CVE-2020-7571, CVE-2021-22718, CVE-2019-6807, CVE-2018-7846, CVE-2019-11091, CVE-2020-7552, CVE-2021-22773, CVE-2023-7032, CVE-2021-22745, CVE-2024-5681, CVE-2020-7519, CVE-2022-22805, CVE-2022-24323, CVE-2019-6829, CVE-2020-25066, CVE-2022-24313, CVE-2021-22755, CVE-2023-25555, CVE-2024-2229, CVE-2021-22798, CVE-2021-33485, CVE-2020-7526, CVE-2021-45105, CVE-2021-44228, CVE-2021-22758, CVE-2023-25551, CVE-2018-7812, CVE-2021-22827, CVE-2021-21830, CVE-2020-7558, CVE-2022-24322, CVE-2021-22811, CVE-2020-7553, CVE-2022-0715, CVE-2021-22720, CVE-2019-8961, CVE-2020-7568, CVE-2021-22737, CVE-2021-22807, CVE-2020-7509, CVE-2021-22741, CVE-2018-7768, CVE-2024-6528, CVE-2022-32525, CVE-2021-22806, CVE-2022-30234, CVE-2020-7492, CVE-2018-7765, CVE-2024-37036, CVE-2020-7551, CVE-2019-1040, CVE-2022-32519, CVE-2020-7490, CVE-2021-22729, CVE-2021-21863, CVE-2023-25550, CVE-2021-22805, CVE-2021-22749, CVE-2020-7554, CVE-2021-22756, CVE-2020-7566, CVE-2019-0708, CVE-2023-27982, CVE-2022-41666, CVE-2021-30062, CVE-2021-22703, CVE-2021-22156, CVE-2019-8963, CVE-2018-7850, CVE-2022-43377, CVE-2020-7504, CVE-2019-6833, CVE-2021-21828, CVE-2021-22705, CVE-2020-7485, CVE-2022-34761, CVE-2021-21866, CVE-2021-21867, CVE-2022-45789, CVE-2021-22826, CVE-2021-22775, CVE-2020-14509, CVE-2022-46680, CVE-2020-27337, CVE-2021-22709, CVE-2020-28895, CVE-2021-22796, CVE-2021-22821, CVE-2023-37198, CVE-2021-21865, CVE-2021-22777, CVE-2021-22712, CVE-2019-6858, CVE-2020-7539, CVE-2019-12265, CVE-2021-22753, CVE-2021-22710, CVE-2021-22711, CVE-2023-5630, CVE-2021-21812, CVE-2024-2051, CVE-2022-24312, CVE-2018-7853, CVE-2021-22698, CVE-2020-7543, CVE-2023-5391, CVE-2020-28220, CVE-2018-7845, CVE-2021-22754, CVE-2019-6843, CVE-2020-11899, CVE-2019-13538, CVE-2021-21811, CVE-2018-7771, CVE-2022-41671, CVE-2018-7847, CVE-2021-4104, CVE-2022-22724, CVE-2019-6855, CVE-2020-14517, CVE-2024-5056, CVE-2021-21827, CVE-2018-7804, CVE-2022-37302, CVE-2022-2465, CVE-2021-21825, CVE-2021-22717, CVE-2022-22732, CVE-2022-0223, CVE-2019-12261, CVE-2020-35198, CVE-2021-22819, CVE-2021-22742, CVE-2021-22740, CVE-2018-7494, CVE-2022-22727, CVE-2022-34758, CVE-2021-22739, CVE-2021-22736, CVE-2024-6918, CVE-2018-7242, CVE-2022-32523, CVE-2022-42972, CVE-2022-30232, CVE-2021-22731, CVE-2022-22725, CVE-2020-7555, CVE-2019-1222, CVE-2022-22807, CVE-2023-27975, CVE-2021-22792, CVE-2019-8960, CVE-2018-7849, CVE-2018-7809, CVE-2018-7240, CVE-2021-22735, CVE-2021-22757, CVE-2020-10664, CVE-2020-11897, CVE-2018-7766, CVE-2024-5313, CVE-2020-7500, CVE-2020-7476, CVE-2022-42971, CVE-2021-21815, CVE-2023-37200, CVE-2020-7532, CVE-2019-11135, CVE-2022-30236, CVE-2022-22812, CVE-2023-28004, CVE-2020-17438, CVE-2020-7499, CVE-2021-22817, CVE-2023-25553, CVE-2020-7491, CVE-2021-22748, CVE-2020-7483, CVE-2020-25184, CVE-2020-7487, CVE-2024-6407, CVE-2023-5985, CVE-2022-32513, CVE-2018-7854, CVE-2022-22726, CVE-2021-22778, CVE-2020-7520, CVE-2023-2569, CVE-2018-7767, CVE-2023-27984, CVE-2021-22789, CVE-2023-27976, CVE-2020-7481, CVE-2019-6806, CVE-2020-7475, CVE-2021-22743, CVE-2022-24318, CVE-2021-22803, CVE-2022-45788, CVE-2020-7521, CVE-2021-22728, CVE-2022-24316, CVE-2021-22724, CVE-2021-22707, CVE-2021-22801, CVE-2022-30233, CVE-2020-7477, CVE-2019-12260, CVE-2021-22734, CVE-2019-1223, CVE-2020-28209, CVE-2020-7507, CVE-2023-27983, CVE-2022-22723, CVE-2020-28215, CVE-2021-22697, CVE-2022-30235, CVE-2019-9008, CVE-2019-6846, CVE-2021-22809, CVE-2021-22761, CVE-2022-1467, CVE-2020-7534, CVE-2022-24315, CVE-2020-7474, CVE-2019-12259, CVE-2020-12525, CVE-2022-22810, CVE-2019-12262, CVE-2019-6809, CVE-2021-22794, CVE-2023-2570, CVE-2021-29240, CVE-2022-2329, CVE-2020-7495, CVE-2023-37199, CVE-2024-37040, CVE-2020-7523, CVE-2022-43378, CVE-2019-12263, CVE-2021-22759, CVE-2020-7529, CVE-2023-6407, CVE-2022-41668, CVE-2020-7524, CVE-2022-24314, CVE-2021-22780, CVE-2021-22818, CVE-2021-1675, CVE-2018-12130, CVE-2020-7570, CVE-2022-22722, CVE-2020-7546, CVE-2021-22781, CVE-2018-7855, CVE-2021-22722, CVE-2020-7564, CVE-2022-34765, CVE-2023-5986, CVE-2022-43376, CVE-2023-27977, CVE-2023-25619, CVE-2022-34755, CVE-2021-22797, CVE-2020-0938, CVE-2020-11902, CVE-2020-7497, CVE-2020-11904, CVE-2020-11913, CVE-2024-2747, CVE-2018-7842, CVE-2019-12258, CVE-2022-2988, CVE-2018-7831, CVE-2020-28219, CVE-2019-1226, CVE-2019-6844, CVE-2020-7052, CVE-2018-7774, CVE-2019-6841, CVE-2020-0796, CVE-2021-34527, CVE-2023-4516, CVE-2021-22770, CVE-2021-22816, CVE-2020-7545, CVE-2022-24324, CVE-2019-1224, CVE-2019-9009, CVE-2021-30064, CVE-2023-27978, CVE-2022-26507, CVE-2019-6848, CVE-2022-4062, CVE-2022-24317, CVE-2021-22746, CVE-2020-7530, CVE-2021-22764, CVE-2023-29410, CVE-2020-7503, CVE-2021-22814, CVE-2022-32528, CVE-2020-28212, CVE-2018-7810, CVE-2019-1225, CVE-2020-7484, CVE-2018-7811, CVE-2022-32517, CVE-2021-22822, CVE-2020-7522, CVE-2018-7833, CVE-2021-30188, CVE-2021-31401, CVE-2019-6842, CVE-2018-7857, CVE-2022-22808, CVE-2020-27338, CVE-2024-5558, CVE-2021-22825, CVE-2021-21810, CVE-2022-2464, CVE-2022-30238, CVE-2020-11914, CVE-2022-32512, CVE-2022-30552, CVE-2021-22815, CVE-2021-22820, CVE-2021-21869, CVE-2021-22704, CVE-2021-22772, CVE-2021-22823, CVE-2020-1350, CVE-2022-34764, CVE-2018-7777, CVE-2020-7538, CVE-2020-7489, CVE-2020-7478, CVE-2021-22750, CVE-2020-28218, CVE-2018-7770, CVE-2018-7856, CVE-2020-11909, CVE-2021-22767, CVE-2019-6850, CVE-2020-7544, CVE-2020-35685, CVE-2020-11912, CVE-2024-8401, CVE-2018-12126, CVE-2022-41669, CVE-2018-7772, CVE-2021-22774, CVE-2021-30061, CVE-2023-25549, CVE-2023-5984, CVE-2023-37197, CVE-2021-22702, CVE-2022-34763, CVE-2021-21826, CVE-2021-31400, CVE-2020-11906, CVE-2021-22790, CVE-2020-8597, CVE-2019-19193, CVE-2021-22800, CVE-2019-12255, CVE-2024-5679, CVE-2023-25547, CVE-2022-34760, CVE-2022-24320, CVE-2022-37300, CVE-2021-22785, CVE-2024-2052, CVE-2019-12257, CVE-2020-25180, CVE-2018-7241, CVE-2020-7537, CVE-2021-22791, CVE-2020-7486, CVE-2020-7482, CVE-2022-32529, CVE-2021-21813

Trust: 3.5

Fetched: Sept. 27, 2024, 9:29 a.m., Published: Sept. 27, 2024, midnight
Vulnerabilities: default credentials
Affected productsExternal IDs

Trust: 3.25

Fetched: Sept. 27, 2024, 9:29 a.m., Published: Sept. 27, 0350, midnight
Vulnerabilities: privilege escalation
Affected productsExternal IDs
db: NVD ids: CVE-2024-32896

Trust: 3.0

Fetched: Sept. 27, 2024, 9:28 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: sonicwall model: soho
vendor: sonicwall model: sonicos

Trust: 5.5

Fetched: Sept. 27, 2024, 9:26 a.m., Published: Jan. 27, 5295, midnight
Vulnerabilities: header injection, request forgery, cross-site request forgery...
Affected productsExternal IDs
db: NVD ids: CVE-2024-8725, CVE-2024-45983, CVE-2024-41605, CVE-2024-46632, CVE-2024-47197, CVE-2024-43191, CVE-2024-30134, CVE-2024-8861, CVE-2024-31899, CVE-2024-44860, CVE-2024-9199, CVE-2024-46329, CVE-2024-7107, CVE-2024-45982, CVE-2024-4278, CVE-2024-47337, CVE-2024-37125, CVE-2024-46627, CVE-2024-46328, CVE-2024-45979, CVE-2024-46330, CVE-2024-9177, CVE-2024-45981, CVE-2024-9166, CVE-2024-47003, CVE-2024-47145, CVE-2024-46327, CVE-2024-7259, CVE-2024-7108, CVE-2024-45980, CVE-2024-8771, CVE-2024-47044, CVE-2022-4541, CVE-2024-9025, CVE-2024-9127, CVE-2024-9173, CVE-2024-8872, CVE-2024-8126, CVE-2024-39319, CVE-2024-9203, CVE-2024-45843, CVE-2024-9115, CVE-2024-9117, CVE-2024-8633, CVE-2023-46175, CVE-2024-42406, CVE-2024-9155, CVE-2024-9125, CVE-2024-9198, CVE-2024-8704

Trust: 4.0

Fetched: Sept. 27, 2024, 9:26 a.m., Published: May 27, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: lexmark model: xc4150
vendor: lexmark model: lexmark
db: NVD ids: CVE-2022-29850

Trust: 4.5

Fetched: Sept. 27, 2024, 9:25 a.m., Published: Sept. 11, 2024, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: huawei model: huawei
Related entries in the VARIoT vulnerabilities database: VAR-202408-1532

Trust: 3.0

Fetched: Sept. 27, 2024, 9:24 a.m., Published: May 16, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-40620

Trust: 3.5

Fetched: Sept. 27, 2024, 9:24 a.m., Published: Sept. 26, 2024, 11:42 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: canonical model: ubuntu
vendor: cups model: cups
db: NVD ids: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177
Related entries in the VARIoT vulnerabilities database: VAR-202408-1859, VAR-202408-2138

Trust: 4.25

Fetched: Sept. 27, 2024, 9:16 a.m., Published: Aug. 27, 2024, midnight
Vulnerabilities: code execution, information disclosure, denial of service
Affected productsExternal IDs
vendor: motorola model: android
vendor: motorola model: motorola
vendor: google model: pixel
vendor: google model: android
vendor: huawei model: huawei
vendor: samsung model: mobile
vendor: samsung model: samsung
vendor: samsung model: notes
vendor: samsung model: note
db: NVD ids: CVE-2024-23355, CVE-2024-34734, CVE-2023-21351, CVE-2024-34738, CVE-2024-20082, CVE-2024-34742, CVE-2024-23356, CVE-2024-34741, CVE-2024-34731, CVE-2024-34740, CVE-2024-23353, CVE-2024-23352, CVE-2024-2937, CVE-2024-34735, CVE-2024-31333, CVE-2024-4607, CVE-2024-34737, CVE-2024-23350, CVE-2023-20971, CVE-2024-34727, CVE-2024-34739, CVE-2024-34743, CVE-2024-21481, CVE-2024-36971, CVE-2024-23357, CVE-2024-34736

Trust: 4.5

Fetched: Sept. 27, 2024, 9:15 a.m., Published: -
Vulnerabilities: cross-site scripting, os command injection, authentication bypass...
Affected productsExternal IDs
db: NVD ids: CVE-2024-43423, CVE-2024-8497, CVE-2024-41725, CVE-2024-6981, CVE-2024-43692, CVE-2024-8310, CVE-2024-45373, CVE-2024-8630, CVE-2024-45066, CVE-2024-43693

Trust: 3.0

Fetched: Sept. 25, 2024, 10:04 a.m., Published: Sept. 19, 2024, 5:29 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-8190, CVE-2024-8963

Trust: 4.75

Fetched: Sept. 25, 2024, 10:04 a.m., Published: Sept. 2, 2024, midnight
Vulnerabilities: information disclosure, cross-site scripting, privilege escalation
Affected productsExternal IDs
vendor: apple model: ipad
vendor: apple model: iphone
vendor: apple model: watchos
vendor: apple model: safari
vendor: apple model: macos
vendor: apple model: tvos

Trust: 3.25

Fetched: Sept. 25, 2024, 10:04 a.m., Published: Sept. 10, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 3.25

Fetched: Sept. 25, 2024, 10:03 a.m., Published: Sept. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 5.25

Fetched: Sept. 25, 2024, 10:02 a.m., Published: -
Vulnerabilities: default password, default credentials
Affected productsExternal IDs
vendor: google model: home
vendor: sonicwall model: remote access

Trust: 3.0

Fetched: Sept. 25, 2024, 10:01 a.m., Published: Sept. 19, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: iphone
vendor: apple model: safari
vendor: apple model: watchos
vendor: apple model: macos
vendor: apple model: tvos
Related entries in the VARIoT vulnerabilities database: VAR-201704-0340

Trust: 4.25

Fetched: Sept. 25, 2024, 10 a.m., Published: Sept. 23, 2020, midnight
Vulnerabilities: code execution, code injection
Affected productsExternal IDs
vendor: dell model: bios
vendor: dell model: optiplex
db: NVD ids: CVE-2016-7585

Trust: 3.75

Fetched: Sept. 25, 2024, 9:55 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: lenovo model: system
db: NVD ids: CVE-2024-8105

Trust: 4.25

Fetched: Sept. 25, 2024, 9:54 a.m., Published: Sept. 25, 2024, 7:16 a.m.
Vulnerabilities: sql injection, path traversal
Affected productsExternal IDs
vendor: schneider electric model: monitor
vendor: trend model: security
vendor: schneider model: monitor