VARIoT news about IoT security

Trust: 4.75

Fetched: May 22, 2024, 11:50 a.m., Published: May 21, 2024, 4:56 p.m.
Vulnerabilities: request forgery, brute force attack, command execution...
Affected productsExternal IDs
db: NVD ids: CVE-2024-26026, CVE-2024-21793

Trust: 4.0

Fetched: May 22, 2024, 11:50 a.m., Published: May 22, 2024, 6:23 a.m.
Vulnerabilities: memory leak
Affected productsExternal IDs
db: NVD ids: CVE-2021-47472

Trust: 3.0

Fetched: May 22, 2024, 11:49 a.m., Published: May 21, 2024, 3:31 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-52784

Trust: 3.25

Fetched: May 22, 2024, 11:49 a.m., Published: May 17, 2024, midnight
Vulnerabilities: authentication vulnerability
Affected productsExternal IDs

Trust: 4.75

Fetched: May 22, 2024, 11:49 a.m., Published: May 9, 2024, noon
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: trend micro model: security
vendor: trend model: security
db: NVD ids: CVE-2023-46604

Trust: 4.75

Fetched: May 22, 2024, 11:48 a.m., Published: May 16, 2024, 4:29 p.m.
Vulnerabilities: buffer overflow, code execution
Affected productsExternal IDs
vendor: roku model: roku
db: NVD ids: CVE-2023-6324, CVE-2023-6322, CVE-2023-6323, CVE-2023-6321
Related entries in the VARIoT vulnerabilities database: VAR-202108-1856, VAR-202005-0222, VAR-202005-0223, VAR-202005-0473, VAR-202006-0946

Trust: 5.5

Fetched: May 22, 2024, 11:38 a.m., Published: May 1, 2024, midnight
Vulnerabilities: integer overflow, denial of service, application crash...
Affected productsExternal IDs
vendor: node.js model: node.js
db: NVD ids: CVE-2022-46908, CVE-2021-36690, CVE-2021-45346, CVE-2021-20223, CVE-2020-13630, CVE-2020-13632, CVE-2022-24854, CVE-2019-19923, CVE-2020-13631, CVE-2020-9327, CVE-2021-42169, CVE-2022-21227, CVE-2023-32697, CVE-2019-19926, CVE-2020-13434, CVE-2020-6405, CVE-2020-11656, CVE-2019-19646, CVE-2019-19925, CVE-2023-39939, CVE-2021-23404, CVE-2023-39543, CVE-2022-38627, CVE-2020-13871, CVE-2019-19959, CVE-2019-19924, CVE-2022-35737, CVE-2020-13435, CVE-2020-15358, CVE-2023-7104, CVE-2024-0232, CVE-2020-11655, CVE-2021-28305, CVE-2019-20218, CVE-2019-19317, CVE-2021-20227

Trust: 4.5

Fetched: May 22, 2024, 11:37 a.m., Published: May 21, 2024, midnight
Vulnerabilities: denial of service, buffer overflow
Affected productsExternal IDs
db: NVD ids: CVE-2024-0816, CVE-2023-37929
Related entries in the VARIoT vulnerabilities database: VAR-202107-0545, VAR-202107-0541, VAR-202107-0543, VAR-202107-0544, VAR-202107-0026

Trust: 4.25

Fetched: May 22, 2024, 11:36 a.m., Published: July 13, 2021, 9:04 p.m.
Vulnerabilities: information disclosure, buffer overflow, code execution
Affected productsExternal IDs
vendor: samsung model: mobile devices
vendor: samsung model: mobile
vendor: huawei model: huawei
vendor: google model: android
vendor: google model: pixel
db: NVD ids: CVE-2021-0587, CVE-2021-1888, CVE-2021-1886, CVE-2021-1890, CVE-2021-0592, CVE-2021-1889, CVE-2020-11307, CVE-2021-1965

Trust: 3.25

Fetched: May 22, 2024, 11:27 a.m., Published: May 25, 2024, midnight
Vulnerabilities: request forgery, remote file inclusion, format string vulnerability...
Affected productsExternal IDs
vendor: mandriva model: linux
vendor: trend model: security
vendor: netbsd model: netbsd
vendor: netbsd model: beta
vendor: netbsd model: current

Trust: 3.5

Fetched: May 22, 2024, 11:26 a.m., Published: July 6, 2022, 10:28 a.m.
Vulnerabilities: default credentials, buffer overflow, code execution
Affected productsExternal IDs

Trust: 3.5

Fetched: May 22, 2024, 11:24 a.m., Published: Jan. 22, 2022, midnight
Vulnerabilities: code injection
Affected productsExternal IDs

Trust: 3.5

Fetched: May 22, 2024, 11:24 a.m., Published: Nov. 1, 2023, 4 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: samsung model: mobile devices
vendor: samsung model: mobile
Related entries in the VARIoT vulnerabilities database: VAR-202003-1707

Trust: 4.25

Fetched: May 22, 2024, 11:23 a.m., Published: -
Vulnerabilities: denial of service, default credentials
Affected productsExternal IDs
vendor: sonos model: sonos
vendor: trend micro model: internet security
vendor: trend micro model: security
vendor: trend micro model: home network security
vendor: trend model: internet security
vendor: trend model: security
vendor: trend model: home network security
db: NVD ids: CVE-2020-9054

Trust: 6.25

Fetched: May 22, 2024, 11:20 a.m., Published: March 22, 2021, midnight
Vulnerabilities: application crash, kernel panic, request forgery...
Affected productsExternal IDs
vendor: tibco software model: enterprise message service
vendor: tibco software model: tibco enterprise message service
vendor: tibco software model: tibco rendezvous
vendor: tibco software model: rendezvous
vendor: tibco model: enterprise message service
vendor: tibco model: tibco enterprise message service
vendor: tibco model: tibco rendezvous
vendor: tibco model: rendezvous
vendor: cisco model: iox application framework
vendor: cisco model: cisco iox
vendor: cisco model: aironet series access points
vendor: cisco model: ios xe
vendor: cisco model: ios xe sd-wan software
vendor: cisco model: cisco ios xe
vendor: cisco model: series
vendor: cisco model: 1100
vendor: cisco model: ios software
vendor: cisco model: industrial integrated services routers
vendor: cisco model: industrial isrs
vendor: cisco model: router
vendor: cisco model: network convergence system
vendor: cisco model: cisco ic3000 industrial compute gateway
vendor: cisco model: cisco aironet series access points
vendor: cisco model: cisco iox application
vendor: cisco model: catalyst 4500
vendor: cisco model: series switches
vendor: cisco model: sd-wan
vendor: cisco model: integrated services routers
vendor: cisco model: aironet access points
vendor: cisco model: cgr 1000
vendor: cisco model: catalyst
vendor: cisco model: aironet_access_points
vendor: cisco model: aironet
vendor: cisco model: cisco catalyst 4500 series
vendor: cisco model: cisco ios
vendor: cisco model: access points
vendor: cisco model: wireless controller
vendor: cisco model: ic3000
vendor: cisco model: ios xe software
vendor: cisco model: routers
vendor: cisco model: jabber
vendor: cisco model: iox application
vendor: cisco model: cisco jabber
vendor: cisco model: series routers
vendor: cisco model: aironet series
vendor: cisco model: catalyst 4500 series
vendor: cisco model: 809 industrial integrated services routers
vendor: cisco model: ic3000 industrial compute gateway
vendor: mulesoft model: mule runtime
vendor: google model: wifi
vendor: google model: android
vendor: tp-link model: gateway
vendor: tp-link model: routers
vendor: tableau model: tableau server
vendor: tableau model: server
vendor: ansible model: ansible
vendor: samsung model: notes
vendor: samsung model: note
vendor: samsung model: printers
vendor: samsung model: mobile
vendor: samsung model: samsung notes
vendor: samsung model: galaxy
vendor: rpath model: linux
vendor: rockwell model: micrologix
vendor: rockwell model: automation micrologix
vendor: rockwell model: micrologix 1400
vendor: nokia model: series
vendor: nokia model: impact
vendor: rockwell automation model: micrologix
vendor: rockwell automation model: automation micrologix
vendor: rockwell automation model: micrologix 1400
vendor: askey model: fiber router rtf3505vw-n1
vendor: askey model: askey fiber router rtf3505vw-n1
vendor: rockwell_automation model: micrologix
vendor: rockwell_automation model: automation micrologix
vendor: rockwell_automation model: micrologix 1400
db: NVD ids: CVE-2021-1394, CVE-2020-7467, CVE-2021-1452, CVE-2021-27440, CVE-2021-29266, CVE-2021-25372, CVE-2021-21373, CVE-2021-25354, CVE-2020-25581, CVE-2021-25355, CVE-2021-25371, CVE-2021-28250, CVE-2021-20284, CVE-2020-28695, CVE-2021-1391, CVE-2019-19350, CVE-2021-22506, CVE-2020-7464, CVE-2021-1626, CVE-2021-1281, CVE-2021-21389, CVE-2021-1417, CVE-2021-28823, CVE-2021-29093, CVE-2021-1627, CVE-2021-21385, CVE-2021-1382, CVE-2021-1441, CVE-2019-19354, CVE-2021-1435, CVE-2021-22886, CVE-2021-20289, CVE-2021-27454, CVE-2021-29255, CVE-2021-23890, CVE-2021-27194, CVE-2021-1469, CVE-2021-1454, CVE-2021-20677, CVE-2021-1436, CVE-2021-20683, CVE-2021-28247, CVE-2021-1375, CVE-2021-1383, CVE-2021-28117, CVE-2021-28249, CVE-2021-29094, CVE-2021-21374, CVE-2021-28820, CVE-2021-1398, CVE-2021-28248, CVE-2021-27452, CVE-2021-21411, CVE-2021-22194, CVE-2021-25352, CVE-2021-22659, CVE-2021-3027, CVE-2021-28821, CVE-2021-3392, CVE-2020-25580, CVE-2021-22184, CVE-2021-1431, CVE-2021-3409, CVE-2020-35518, CVE-2021-29265, CVE-2021-25351, CVE-2021-20193, CVE-2021-1629, CVE-2021-21401, CVE-2021-1437, CVE-2021-1385, CVE-2021-1460, CVE-2021-25367, CVE-2021-21403, CVE-2021-20285, CVE-2021-29156, CVE-2021-1376, CVE-2021-1403, CVE-2021-20271, CVE-2021-1471, CVE-2020-7461, CVE-2021-27962, CVE-2021-21332, CVE-2021-20681, CVE-2021-26715, CVE-2021-27450, CVE-2021-1352, CVE-2021-3109, CVE-2021-28824, CVE-2021-1449, CVE-2021-1434, CVE-2021-29249, CVE-2021-1374, CVE-2021-27193, CVE-2021-1220, CVE-2020-19625, CVE-2021-21396, CVE-2021-26596, CVE-2021-21333, CVE-2021-1432, CVE-2020-25578, CVE-2021-28818, CVE-2021-1453, CVE-2021-1439, CVE-2021-1418, CVE-2021-23888, CVE-2021-20213, CVE-2021-3449, CVE-2020-7468, CVE-2020-17380, CVE-2021-25366, CVE-2021-1381, CVE-2021-29271, CVE-2021-3450, CVE-2021-1384, CVE-2021-22172, CVE-2021-29096, CVE-2021-25350, CVE-2021-1442, CVE-2021-27448, CVE-2021-28246, CVE-2021-1356, CVE-2020-25582, CVE-2021-1628, CVE-2021-20679, CVE-2021-23889, CVE-2021-25349, CVE-2021-1451, CVE-2021-25353, CVE-2021-1371, CVE-2021-27192, CVE-2021-25368, CVE-2021-1443, CVE-2021-21372, CVE-2021-20682, CVE-2021-1446, CVE-2021-27195, CVE-2021-28822, CVE-2021-22180, CVE-2020-25579, CVE-2021-27372, CVE-2020-35508, CVE-2021-29272, CVE-2021-1377, CVE-2020-35856, CVE-2020-7463, CVE-2021-28956, CVE-2021-3275, CVE-2021-27438, CVE-2021-1423, CVE-2021-26597, CVE-2021-1390, CVE-2019-19349, CVE-2021-1373, CVE-2021-1411, CVE-2021-1392, CVE-2021-3443, CVE-2020-25840, CVE-2020-7462, CVE-2021-3467, CVE-2021-25369, CVE-2021-29264, CVE-2020-27829, CVE-2021-1433, CVE-2020-25085, CVE-2021-25370, CVE-2021-20206, CVE-2021-20197

Trust: 4.0

Fetched: May 22, 2024, 11:16 a.m., Published: May 22, 2023, midnight
Vulnerabilities: denial of service, sql injection, injection attack...

Trust: 4.75

Fetched: May 22, 2024, 11:15 a.m., Published: Nov. 2, 2011, 10:36 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs

Trust: 3.75

Fetched: May 22, 2024, 11:12 a.m., Published: Jan. 27, 2020, 11:49 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: home
vendor: google model: nexus
vendor: google model: wifi
vendor: google model: google home
vendor: trend model: security

Trust: 3.75

Fetched: May 22, 2024, 11:11 a.m., Published: -
Vulnerabilities: application crash, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2009-2512

Trust: 4.75

Fetched: May 22, 2024, 11:10 a.m., Published: Jan. 22, 2019, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: raspberry pi model: 3