VARIoT news about IoT security

Trust: 3.5

Fetched: July 7, 2024, 10 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: home

Trust: 4.5

Fetched: July 7, 2024, 9:56 a.m., Published: March 7, 2024, midnight
Vulnerabilities: default password
Affected productsExternal IDs
vendor: aruba model: clearpass
vendor: palo model: networks
vendor: palo model: firewall
vendor: schneider model: software update
vendor: schneider model: monitor

Trust: 3.75

Fetched: July 7, 2024, 9:55 a.m., Published: June 11, 2024, 5:48 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-30080

Trust: 5.0

Fetched: July 7, 2024, 9:55 a.m., Published: Jan. 7, 6864, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: canonical model: ubuntu
db: NVD ids: CVE-2024-21823, CVE-2024-26924

Trust: 4.0

Fetched: July 7, 2024, 9:52 a.m., Published: June 23, 2024, 10:29 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-2961, CVE-2024-34102
Related entries in the VARIoT vulnerabilities database: VAR-202004-2176, VAR-202101-0623, VAR-202306-1969, VAR-201401-0271, VAR-201810-0126, VAR-201801-0394, VAR-202112-0377, VAR-202203-0285, VAR-201704-1228, VAR-202004-0593, VAR-201801-0396, VAR-201809-0827, VAR-202203-0283, VAR-202203-1633, VAR-202202-0392, VAR-202306-0535, VAR-201801-0562, VAR-202003-0263, VAR-202203-0288, VAR-201809-0833, VAR-201409-0078, VAR-202203-0930, VAR-202312-0648, VAR-202112-1601, VAR-201903-0935, VAR-201906-0412, VAR-201801-0560, VAR-201704-1317, VAR-201801-0544, VAR-201805-0359, VAR-201712-0921, VAR-202209-0693, VAR-202005-0074, VAR-201805-0799, VAR-201504-0534, VAR-201707-0197, VAR-202003-0261, VAR-202305-0927, VAR-201712-0919, VAR-201801-0546, VAR-202205-1942, VAR-201710-1271, VAR-201811-0489, VAR-202307-1699, VAR-202309-1870, VAR-201809-0834, VAR-202306-1338, VAR-201801-0554, VAR-202108-0934, VAR-202302-2049, VAR-201807-1255, VAR-201704-1231, VAR-201805-0358, VAR-201806-1296, VAR-202204-1019, VAR-202203-0277, VAR-202011-0839, VAR-201711-0635, VAR-202403-1395, VAR-201910-1199, VAR-201409-0077, VAR-201810-0124, VAR-202102-1088, VAR-202310-2043, VAR-202405-1812, VAR-201801-0469, VAR-201712-0951, VAR-202402-0339, VAR-201801-0557, VAR-202001-0808, VAR-202003-1767, VAR-201704-1325, VAR-201801-0471, VAR-202203-0284, VAR-202401-2669, VAR-201908-1950, VAR-201711-0634, VAR-202301-0769, VAR-202404-0250, VAR-201907-0683, VAR-202305-1841, VAR-202202-0235, VAR-201809-0826, VAR-201204-0036, VAR-201610-0501, VAR-201801-0553, VAR-201811-0373, VAR-201905-0631, VAR-202212-0453, VAR-202402-0660, VAR-202011-0609, VAR-202207-0311, VAR-201809-0832, VAR-202203-0985, VAR-201805-0361, VAR-202112-0695, VAR-202310-1948, VAR-201809-0830, VAR-202202-0768, VAR-201310-0194, VAR-201910-1198, VAR-201805-0362, VAR-201910-1350, VAR-201805-0360, VAR-201712-0920, VAR-202203-1729, VAR-202005-0328, VAR-202403-2025, VAR-202206-0808, VAR-202306-1762, VAR-202207-1925, VAR-202202-0900, VAR-202106-1458, VAR-202203-0929, VAR-201801-0397, VAR-201711-0636, VAR-201412-0139, VAR-202006-0114, VAR-202310-1949, VAR-202005-0351, VAR-202404-0249, VAR-202404-0371, VAR-202402-1428, VAR-202005-0330, VAR-201711-0587, VAR-202406-1806, VAR-202202-1530, VAR-201807-1265, VAR-202105-0076, VAR-202004-0373, VAR-202003-0266, VAR-202008-0607, VAR-201211-0400, VAR-202111-0616, VAR-202112-1786, VAR-201908-0561, VAR-202210-1596, VAR-202202-0901, VAR-201812-0621, VAR-202203-0984, VAR-202202-0236, VAR-201801-0563, VAR-201809-1154, VAR-202310-2042, VAR-201809-0823, VAR-201806-0941, VAR-201410-0027, VAR-202003-1473, VAR-201908-0717, VAR-201801-0558, VAR-202306-1825, VAR-202202-1230, VAR-202404-0248, VAR-202310-1730, VAR-202210-1763, VAR-202008-0609, VAR-202403-0160, VAR-202306-1898, VAR-201905-1254, VAR-201812-0620, VAR-201908-1949, VAR-202308-2514, VAR-202310-1634, VAR-201908-0587, VAR-202011-0857, VAR-202306-0563, VAR-201806-1298, VAR-201807-1062, VAR-202202-1685, VAR-202104-1458, VAR-201710-1284, VAR-202310-2551, VAR-201409-0021, VAR-202311-0659, VAR-201904-0560, VAR-202310-2454, VAR-201906-0411, VAR-202008-0610, VAR-202207-0880, VAR-202011-1354, VAR-202304-1960, VAR-202104-1032, VAR-202201-1436, VAR-201704-1323, VAR-201801-0470, VAR-202103-0944, VAR-202301-0770, VAR-201707-0489, VAR-201809-0822, VAR-202306-0534, VAR-202001-0855, VAR-201301-0046, VAR-202210-1232, VAR-201910-1201, VAR-202202-1579, VAR-202310-2143, VAR-201805-0800, VAR-201807-1490, VAR-202310-2252, VAR-202303-1268, VAR-202203-0926, VAR-201505-0408, VAR-202211-1625, VAR-202310-2351, VAR-202008-0608, VAR-202001-0854, VAR-202001-0288, VAR-202206-2305, VAR-202402-0356, VAR-201706-0765, VAR-202211-1345, VAR-202203-0280, VAR-202308-2767, VAR-201810-0125, VAR-202406-0858, VAR-201809-0831, VAR-202008-0768, VAR-202306-0826, VAR-202203-1789, VAR-202106-1459, VAR-201807-1257, VAR-201811-0378, VAR-202011-1352, VAR-201907-0682, VAR-201809-0825, VAR-201801-0551, VAR-202210-1679, VAR-202310-2646, VAR-202003-0260, VAR-201812-0665, VAR-202303-1296, VAR-202104-1585, VAR-202303-2602, VAR-202308-2976, VAR-202203-0281, VAR-202202-0899, VAR-202202-1221, VAR-202202-1531, VAR-202003-0264, VAR-202306-1722, VAR-202101-0591, VAR-201310-0206, VAR-202309-0276, VAR-202309-0275, VAR-201910-1196, VAR-202212-2145, VAR-202003-0262, VAR-201310-0195, VAR-201809-0829, VAR-202203-1850, VAR-201801-0564, VAR-201910-1200, VAR-202308-3520, VAR-202112-2341, VAR-202306-1653, VAR-201808-0631, VAR-202006-0988, VAR-201809-0828, VAR-201801-0472, VAR-202005-0329, VAR-201704-1230, VAR-201801-0565, VAR-202202-0237, VAR-202202-1344, VAR-202002-0513, VAR-202108-1585, VAR-201801-0556, VAR-201809-0824, VAR-201906-0888, VAR-201908-0562, VAR-201812-0622, VAR-201801-0561, VAR-201310-0196, VAR-202203-0282, VAR-202012-1159, VAR-202201-1060, VAR-202310-2453, VAR-201810-0173, VAR-202312-2583, VAR-202002-1073, VAR-201801-0552, VAR-201809-0820, VAR-201704-1324, VAR-201901-0076, VAR-201801-0545, VAR-201809-0821, VAR-201801-0559, VAR-201801-0395, VAR-201806-1297, VAR-201704-1229, VAR-201310-0197, VAR-201906-0410, VAR-202002-0460, VAR-202202-1521, VAR-201704-1232, VAR-202404-0331, VAR-202104-1656, VAR-202310-2142, VAR-202003-0265, VAR-202302-1636, VAR-201501-0652, VAR-201712-0924, VAR-201807-1256, VAR-202303-1251

Trust: 6.0

Fetched: July 7, 2024, 9:47 a.m., Published: Aug. 24, 2030, midnight
Vulnerabilities: directory traversal, command injection, default password...
Affected productsExternal IDs
vendor: netgear model: netusb.ko
vendor: netgear model: ac1200
vendor: netgear model: router
vendor: netgear model: d7800
vendor: netgear model: r6700v3
vendor: netgear model: n300
vendor: netgear model: r6400v2
vendor: d-link model: router
vendor: kcodes model: netusb.ko
vendor: kcodes model: netusb
vendor: tplink model: tl-sc
vendor: tplink model: tl-wr840n
vendor: tplink model: tl-wrn841n
vendor: tplink model: tl-sc3130g
vendor: tplink model: 8840t
vendor: tplink model: tl-wdr3600
vendor: tplink model: tl-xdr1850
vendor: tplink model: archer c2
vendor: tplink model: archer c1200 firmware
vendor: tplink model: tl-wpa4220
vendor: tplink model: er5120g
vendor: tplink model: tl-xdr5430
vendor: tplink model: tl-wr886n
vendor: tplink model: wr842nd
vendor: tplink model: tl-sc 3130
vendor: tplink model: tl-mr3220
vendor: tplink model: tl-wr841n v8
vendor: tplink model: nc230
vendor: tplink model: tl-r473g
vendor: tplink model: archer ax50
vendor: tplink model: tp-link nc200
vendor: tplink model: wr840n
vendor: tplink model: archer c7
vendor: tplink model: tl-r473gp-ac
vendor: tplink model: wr841n
vendor: tplink model: nc260
vendor: tplink model: tl-wdr3500
vendor: tplink model: tl-wa855re
vendor: tplink model: tl-wr941nd
vendor: tplink model: tl-wvr
vendor: tplink model: tl-sg108e
vendor: tplink model: r473g
vendor: tplink model: tl-wdr4300
vendor: tplink model: tl-xdr1860
vendor: tplink model: archer c3200 v1
vendor: tplink model: tp-link tl-wr841n
vendor: tplink model: wr940n wifi routers
vendor: tplink model: tl-r600vpn hwv3 frnv1.3.0
vendor: tplink model: td-w8961nd
vendor: tplink model: tl-xdr3250
vendor: tplink model: a7 ac1750
vendor: tplink model: archer c2 v1
vendor: tplink model: tp-sg105e
vendor: tplink model: tl-ipc325
vendor: tplink model: tl-wr740nd
vendor: tplink model: tp-link archer c9
vendor: tplink model: tp-link nc250
vendor: tplink model: tl-r4239g
vendor: tplink model: nc210
vendor: tplink model: tl-wr1043nd
vendor: tplink model: tl-wa855re firmware
vendor: tplink model: archer c5v 1.7_181221
vendor: tplink model: tl-wa850re
vendor: tplink model: tl-wr940n
vendor: tplink model: tl-wr740n
vendor: tplink model: tl-xdr6060
vendor: tplink model: archer c5
vendor: tplink model: tl-r479gp-ac
vendor: tplink model: nc450
vendor: tplink model: tl-wr841n router
vendor: tplink model: routers
vendor: tplink model: tl-sc 3130g
vendor: tplink model: tl-sc3171g
vendor: tplink model: archer c1200
vendor: tplink model: tl-sc3130
vendor: tplink model: archer c9
vendor: tplink model: omada controller
vendor: tplink model: tl-wr841nd
vendor: tplink model: tp-link tl-wdr4300
vendor: tplink model: tl-wr741nd
vendor: tplink model: archer a7 ac1750
vendor: tplink model: tl-ipc323k-d
vendor: tplink model: tl-wdr5620
vendor: tplink model: gateway
vendor: tplink model: archer c50
vendor: tplink model: nc220
vendor: tplink model: tl-wr1043nd v1_120405
vendor: tplink model: tp-link 8840t
vendor: tplink model: tl-xdr6060 turbo
vendor: tplink model: tl-ipc40a-4
vendor: tplink model: tl-wr841n firmware
vendor: tplink model: archer cr-700
vendor: tplink model: r4239g
vendor: tplink model: r473gp-ac
vendor: tplink model: m7350
vendor: tplink model: tl-xdr3230
vendor: tplink model: tl-wr849n
vendor: tplink model: tl-war
vendor: tplink model: tl-r600vpn
vendor: tplink model: wdr series
vendor: tplink model: wr940n
vendor: tplink model: eap controller
vendor: tplink model: c20i
vendor: tplink model: tl-wr802n
vendor: tplink model: tl-ps310u
vendor: tplink model: ac1750
vendor: tplink model: nc250
vendor: tplink model: wr841n v8
vendor: tplink model: tl-wr841n
vendor: tplink model: archer c5v
vendor: tplink model: tl-sc3171
vendor: tplink model: nc200
vendor: tplink model: archer a7
vendor: tplink model: tl-wr741n
vendor: tplink model: tl-wr840n 6_eu_0.9.1_4.16
vendor: tplink model: tl-wdr7660
vendor: tplink model: tl-war1200l
vendor: tplink model: archer c3200
vendor: huawei model: huawei
vendor: huawei model: mt882
vendor: tp-link model: tl-sc
vendor: tp-link model: tl-wr840n
vendor: tp-link model: tl-wrn841n
vendor: tp-link model: tl-sc3130g
vendor: tp-link model: 8840t
vendor: tp-link model: tl-wdr3600
vendor: tp-link model: tl-xdr1850
vendor: tp-link model: archer c2
vendor: tp-link model: archer c1200 firmware
vendor: tp-link model: tl-wpa4220
vendor: tp-link model: er5120g
vendor: tp-link model: tl-xdr5430
vendor: tp-link model: tl-wr886n
vendor: tp-link model: wr842nd
vendor: tp-link model: tl-sc 3130
vendor: tp-link model: tl-mr3220
vendor: tp-link model: tl-wr841n v8
vendor: tp-link model: nc230
vendor: tp-link model: tl-r473g
vendor: tp-link model: archer ax50
vendor: tp-link model: tp-link nc200
vendor: tp-link model: wr840n
vendor: tp-link model: archer c7
vendor: tp-link model: tl-r473gp-ac
vendor: tp-link model: wr841n
vendor: tp-link model: nc260
vendor: tp-link model: tl-wdr3500
vendor: tp-link model: tl-wa855re
vendor: tp-link model: tl-wr941nd
vendor: tp-link model: tl-wvr
vendor: tp-link model: tl-sg108e
vendor: tp-link model: r473g
vendor: tp-link model: tl-wdr4300
vendor: tp-link model: tl-xdr1860
vendor: tp-link model: archer c3200 v1
vendor: tp-link model: tp-link tl-wr841n
vendor: tp-link model: wr940n wifi routers
vendor: tp-link model: tl-r600vpn hwv3 frnv1.3.0
vendor: tp-link model: td-w8961nd
vendor: tp-link model: tl-xdr3250
vendor: tp-link model: a7 ac1750
vendor: tp-link model: archer c2 v1
vendor: tp-link model: tp-sg105e
vendor: tp-link model: tl-ipc325
vendor: tp-link model: tl-wr740nd
vendor: tp-link model: tp-link archer c9
vendor: tp-link model: tp-link nc250
vendor: tp-link model: tl-r4239g
vendor: tp-link model: nc210
vendor: tp-link model: tl-wr1043nd
vendor: tp-link model: tl-wa855re firmware
vendor: tp-link model: archer c5v 1.7_181221
vendor: tp-link model: tl-wa850re
vendor: tp-link model: tl-wr940n
vendor: tp-link model: tl-wr740n
vendor: tp-link model: tl-xdr6060
vendor: tp-link model: archer c5
vendor: tp-link model: tl-r479gp-ac
vendor: tp-link model: nc450
vendor: tp-link model: tl-wr841n router
vendor: tp-link model: routers
vendor: tp-link model: tl-sc 3130g
vendor: tp-link model: tl-sc3171g
vendor: tp-link model: archer c1200
vendor: tp-link model: tl-sc3130
vendor: tp-link model: archer c9
vendor: tp-link model: omada controller
vendor: tp-link model: tl-wr841nd
vendor: tp-link model: tp-link tl-wdr4300
vendor: tp-link model: tl-wr741nd
vendor: tp-link model: archer a7 ac1750
vendor: tp-link model: tl-ipc323k-d
vendor: tp-link model: tl-wdr5620
vendor: tp-link model: gateway
vendor: tp-link model: archer c50
vendor: tp-link model: nc220
vendor: tp-link model: tl-wr1043nd v1_120405
vendor: tp-link model: tp-link 8840t
vendor: tp-link model: tl-xdr6060 turbo
vendor: tp-link model: tl-ipc40a-4
vendor: tp-link model: tl-wr841n firmware
vendor: tp-link model: archer cr-700
vendor: tp-link model: r4239g
vendor: tp-link model: r473gp-ac
vendor: tp-link model: m7350
vendor: tp-link model: tl-xdr3230
vendor: tp-link model: tl-wr849n
vendor: tp-link model: tl-war
vendor: tp-link model: tl-r600vpn
vendor: tp-link model: wdr series
vendor: tp-link model: wr940n
vendor: tp-link model: eap controller
vendor: tp-link model: c20i
vendor: tp-link model: tl-wr802n
vendor: tp-link model: tl-ps310u
vendor: tp-link model: ac1750
vendor: tp-link model: nc250
vendor: tp-link model: wr841n v8
vendor: tp-link model: tl-wr841n
vendor: tp-link model: archer c5v
vendor: tp-link model: tl-sc3171
vendor: tp-link model: nc200
vendor: tp-link model: archer a7
vendor: tp-link model: tl-wr741n
vendor: tp-link model: tl-wr840n 6_eu_0.9.1_4.16
vendor: tp-link model: tl-wdr7660
vendor: tp-link model: tl-war1200l
vendor: tp-link model: archer c3200
vendor: tenda model: adsl
vendor: tenda model: ac1200
vendor: tenda model: router
db: NVD ids: CVE-2020-8423, CVE-2020-36178, CVE-2023-36356, CVE-2013-6786, CVE-2018-15702, CVE-2017-15613, CVE-2021-40288, CVE-2021-44632, CVE-2017-8074, CVE-2020-11445, CVE-2017-15615, CVE-2018-17011, CVE-2021-44630, CVE-2023-47618, CVE-2022-26642, CVE-2022-24355, CVE-2023-27126, CVE-2017-15631, CVE-2020-10884, CVE-2021-4045, CVE-2018-17017, CVE-2014-4728, CVE-2021-44629, CVE-2023-49907, CVE-2023-50224, CVE-2023-22303, CVE-2021-4144, CVE-2024-5227, CVE-2023-49910, CVE-2023-49912, CVE-2018-15840, CVE-2019-6989, CVE-2017-15625, CVE-2017-8220, CVE-2023-27078, CVE-2017-15635, CVE-2018-10165, CVE-2017-17747, CVE-2022-37860, CVE-2021-27209, CVE-2020-10916, CVE-2018-11481, CVE-2015-3035, CVE-2017-10796, CVE-2023-39751, CVE-2020-10882, CVE-2023-2646, CVE-2017-17745, CVE-2017-15637, CVE-2022-29402, CVE-2017-13772, CVE-2022-46435, CVE-2018-3948, CVE-2024-5243, CVE-2023-30383, CVE-2023-43135, CVE-2018-17018, CVE-2023-34832, CVE-2017-15629, CVE-2021-29280, CVE-2023-23040, CVE-2024-38471, CVE-2018-12575, CVE-2017-8077, CVE-2018-10164, CVE-2018-12692, CVE-2021-46122, CVE-2021-44032, CVE-2020-28005, CVE-2017-16959, CVE-2024-25139, CVE-2019-13651, CVE-2014-4727, CVE-2018-15700, CVE-2021-27210, CVE-2023-46535, CVE-2023-49909, CVE-2017-15617, CVE-2017-17758, CVE-2023-46683, CVE-2017-15622, CVE-2019-19143, CVE-2020-28877, CVE-2020-10887, CVE-2017-8219, CVE-2017-15619, CVE-2021-44631, CVE-2023-27098, CVE-2019-12104, CVE-2017-16958, CVE-2024-1180, CVE-2023-47617, CVE-2022-4499, CVE-2023-49134, CVE-2019-13614, CVE-2023-31756, CVE-2022-24352, CVE-2018-17010, CVE-2022-46432, CVE-2012-2440, CVE-2024-31340, CVE-2016-1000009, CVE-2022-26987, CVE-2017-15628, CVE-2018-19528, CVE-2022-48194, CVE-2016-10719, CVE-2022-4296, CVE-2023-47209, CVE-2020-24297, CVE-2022-46430, CVE-2022-41783, CVE-2022-32058, CVE-2018-17016, CVE-2021-44627, CVE-2018-10167, CVE-2023-44448, CVE-2022-46914, CVE-2021-41450, CVE-2023-46539, CVE-2018-17014, CVE-2022-25062, CVE-2023-28368, CVE-2013-2578, CVE-2019-13650, CVE-2018-10168, CVE-2013-4848, CVE-2018-10166, CVE-2022-37255, CVE-2017-17746, CVE-2022-26641, CVE-2020-12109, CVE-2023-6437, CVE-2022-30075, CVE-2023-36358, CVE-2023-27836, CVE-2022-34555, CVE-2022-24973, CVE-2021-28857, CVE-2021-44625, CVE-2017-15616, CVE-2017-16960, CVE-2014-9350, CVE-2020-13224, CVE-2023-46523, CVE-2020-12475, CVE-2023-49133, CVE-2023-44447, CVE-2024-1179, CVE-2023-42664, CVE-2023-49913, CVE-2023-43482, CVE-2020-12111, CVE-2017-16957, CVE-2024-37661, CVE-2022-25060, CVE-2018-12574, CVE-2020-17891, CVE-2020-10231, CVE-2023-36498, CVE-2024-21833, CVE-2020-10888, CVE-2020-15054, CVE-2012-5687, CVE-2021-42232, CVE-2021-41653, CVE-2021-41451, CVE-2019-13267, CVE-2022-41540, CVE-2023-31188, CVE-2022-24972, CVE-2018-3950, CVE-2021-44622, CVE-2022-24354, CVE-2017-15632, CVE-2018-5393, CVE-2023-46537, CVE-2018-17007, CVE-2018-11714, CVE-2013-2645, CVE-2024-5244, CVE-2023-49906, CVE-2021-31659, CVE-2020-9375, CVE-2023-43318, CVE-2023-46371, CVE-2019-15060, CVE-2017-15623, CVE-2023-36354, CVE-2022-25074, CVE-2023-49074, CVE-2023-46525, CVE-2022-42433, CVE-2024-5242, CVE-2020-15056, CVE-2024-2188, CVE-2023-36355, CVE-2019-12195, CVE-2018-3949, CVE-2019-12103, CVE-2023-31710, CVE-2023-39610, CVE-2019-13266, CVE-2020-28347, CVE-2023-33537, CVE-2018-12694, CVE-2023-46373, CVE-2018-13134, CVE-2022-22922, CVE-2021-29302, CVE-2017-15291, CVE-2023-46521, CVE-2012-6316, CVE-2023-39471, CVE-2018-18489, CVE-2023-46520, CVE-2019-6972, CVE-2020-15057, CVE-2022-30024, CVE-2020-5797, CVE-2023-27359, CVE-2021-27246, CVE-2021-35003, CVE-2017-8217, CVE-2017-15618, CVE-2021-27245, CVE-2022-4498, CVE-2023-35717, CVE-2024-37662, CVE-2017-11519, CVE-2018-17006, CVE-2023-33538, CVE-2013-2573, CVE-2012-6276, CVE-2022-46434, CVE-2022-41541, CVE-2023-39748, CVE-2019-13653, CVE-2024-5228, CVE-2023-27837, CVE-2019-18992, CVE-2022-25072, CVE-2023-46522, CVE-2018-11482, CVE-2018-14336, CVE-2023-46526, CVE-2023-1389, CVE-2021-44827, CVE-2015-3036, CVE-2023-49908, CVE-2022-46428, CVE-2022-43635, CVE-2023-46527, CVE-2020-15055, CVE-2013-2572, CVE-2019-17147, CVE-2022-33087, CVE-2023-47167, CVE-2013-4654, CVE-2017-9466, CVE-2022-43636, CVE-2021-44623, CVE-2023-39747, CVE-2018-15701, CVE-2024-21827, CVE-2018-17015, CVE-2020-24363, CVE-2023-33536, CVE-2023-28478, CVE-2022-26640, CVE-2021-28858, CVE-2018-12577, CVE-2018-19537, CVE-2020-5795, CVE-2019-13613, CVE-2018-17009, CVE-2017-15626, CVE-2022-46139, CVE-2022-42202, CVE-2023-46534, CVE-2020-10881, CVE-2018-20372, CVE-2019-18993, CVE-2023-27333, CVE-2021-26827, CVE-2023-27346, CVE-2023-39745, CVE-2021-44626, CVE-2022-0650, CVE-2022-0162, CVE-2022-25061, CVE-2020-10885, CVE-2023-36357, CVE-2020-35576, CVE-2013-3688, CVE-2023-40357, CVE-2023-36489, CVE-2023-29562, CVE-2019-13649, CVE-2022-46912, CVE-2020-10883, CVE-2013-2579, CVE-2018-17013, CVE-2022-26639, CVE-2017-15633, CVE-2019-13652, CVE-2023-41184, CVE-2021-45608, CVE-2023-36359, CVE-2018-15172, CVE-2020-14965, CVE-2018-17012, CVE-2017-15620, CVE-2020-12110, CVE-2017-8076, CVE-2017-15634, CVE-2023-49911, CVE-2022-24353, CVE-2021-44864, CVE-2013-2646, CVE-2022-41505, CVE-2021-38543, CVE-2017-15621, CVE-2018-17008, CVE-2018-16119, CVE-2022-26988, CVE-2019-13268, CVE-2018-3951, CVE-2023-30307, CVE-2017-15630, CVE-2023-50225, CVE-2024-21821, CVE-2013-2580, CVE-2021-44628, CVE-2021-3275, CVE-2020-35575, CVE-2022-46910, CVE-2021-35004, CVE-2024-21773, CVE-2023-46536, CVE-2018-18428, CVE-2023-34829, CVE-2020-9374, CVE-2017-15627, CVE-2018-17004, CVE-2017-8218, CVE-2019-6487, CVE-2017-15636, CVE-2018-17005, CVE-2017-15624, CVE-2017-15614, CVE-2018-12693, CVE-2017-8075, CVE-2023-31701, CVE-2013-2581, CVE-2023-31700, CVE-2019-6971, CVE-2019-16893, CVE-2022-25064, CVE-2017-8078, CVE-2023-48724, CVE-2021-3125, CVE-2023-46538, CVE-2020-10886, CVE-2023-0936, CVE-2014-9510, CVE-2021-31658, CVE-2017-17757, CVE-2018-12576, CVE-2023-27332

Trust: 3.25

Fetched: July 7, 2024, 9:43 a.m., Published: July 3, 2024, 12:55 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android
vendor: google model: home
vendor: google model: google home
vendor: google model: chromecast
vendor: google model: nest cam iq indoor
vendor: google model: pixel
vendor: nest model: learning thermostat
vendor: nest model: nest cam
vendor: apple model: watch
vendor: ring model: video doorbell

Trust: 3.0

Fetched: July 7, 2024, 9:39 a.m., Published: July 5, 2024, 7:15 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-39479

Trust: 4.5

Fetched: July 7, 2024, 9:38 a.m., Published: July 2, 2024, 7:33 a.m.
Vulnerabilities: code execution, buffer overflow, improper bounds checking
Affected productsExternal IDs
db: NVD ids: CVE-2024-6387

Trust: 3.75

Fetched: July 7, 2024, 9:37 a.m., Published: July 7, 2024, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: canary model: canary

Trust: 3.5

Fetched: July 7, 2024, 9:35 a.m., Published: June 27, 2024, 3 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: avast model: antivirus
vendor: apple model: macos
vendor: apple model: iphone
vendor: apple model: tvos
vendor: apple model: watchos
vendor: trend model: antivirus
vendor: trend model: internet security
vendor: trend model: security

Trust: 4.0

Fetched: July 7, 2024, 9:34 a.m., Published: Jan. 7, 6863, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: canonical model: ubuntu
db: NVD ids: CVE-2024-26924
Related entries in the VARIoT vulnerabilities database: VAR-202309-2171

Trust: 5.5

Fetched: July 7, 2024, 9:34 a.m., Published: July 3, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: rockwell model: automation panelview plus
vendor: rockwell model: rslogix
vendor: rockwell model: factorytalk view
vendor: rockwell model: automation panelview
vendor: rockwell model: factorytalk
vendor: rockwell automation model: automation panelview plus
vendor: rockwell automation model: rslogix
vendor: rockwell automation model: factorytalk view
vendor: rockwell automation model: automation panelview
vendor: rockwell automation model: factorytalk
db: NVD ids: CVE-2023-2071

Trust: 3.25

Fetched: July 7, 2024, 9:21 a.m., Published: July 5, 2024, 2:47 p.m.
Vulnerabilities: information disclosure, code execution
Affected productsExternal IDs
vendor: rockwell model: automation panelview plus
vendor: rockwell model: factorytalk linx
vendor: rockwell model: factorytalk view
vendor: rockwell model: automation panelview
vendor: rockwell model: factorytalk
vendor: rockwell automation model: automation panelview plus
vendor: rockwell automation model: factorytalk linx
vendor: rockwell automation model: factorytalk view
vendor: rockwell automation model: automation panelview
vendor: rockwell automation model: factorytalk

Trust: 5.5

Fetched: July 7, 2024, 9:20 a.m., Published: July 1, 2024, 8:23 a.m.
Vulnerabilities: denial of service, code execution, memory corruption
Affected productsExternal IDs
vendor: trend model: security
db: NVD ids: CVE-2006-5051, CVE-2008-4109, CVE-2024-6387
Related entries in the VARIoT vulnerabilities database: VAR-202407-0013, VAR-202407-1872, VAR-202407-1709

Trust: 4.25

Fetched: July 7, 2024, 9:17 a.m., Published: July 7, 2024, midnight
Vulnerabilities: information disclosure, denial of service, code execution
Affected productsExternal IDs
vendor: motorola model: android
vendor: motorola model: motorola
vendor: google model: android
vendor: google model: pixel
vendor: samsung model: mobile
vendor: samsung model: notes
vendor: huawei model: huawei
db: NVD ids: CVE-2024-34721, CVE-2024-31331, CVE-2024-34720, CVE-2024-31339, CVE-2024-31334, CVE-2024-21461, CVE-2024-20076, CVE-2024-21469, CVE-2024-21460, CVE-2024-21462, CVE-2024-34725, CVE-2024-21465, CVE-2024-4610, CVE-2024-34723, CVE-2024-34724, CVE-2024-34726, CVE-2024-34722, CVE-2024-31332, CVE-2024-26923, CVE-2024-0153, CVE-2024-31335, CVE-2024-20077, CVE-2024-31320
Related entries in the VARIoT vulnerabilities database: VAR-202303-1268

Trust: 5.5

Fetched: July 7, 2024, 9:15 a.m., Published: July 5, 2024, midnight
Vulnerabilities: command injection, denial of service
Affected productsExternal IDs
vendor: tp-link model: routers
db: NVD ids: CVE-2023-1389

Trust: 3.0

Fetched: July 7, 2024, 9:15 a.m., Published: March 4, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
Related entries in the VARIoT vulnerabilities database: VAR-202310-1699, VAR-202309-2171

Trust: 5.25

Fetched: July 7, 2024, 9:11 a.m., Published: July 3, 2024, 7:23 a.m.
Vulnerabilities: code execution, system crash
Affected productsExternal IDs
vendor: rockwell model: rslogix
vendor: rockwell automation model: rslogix
db: NVD ids: CVE-2023-29464, CVE-2023-2071
Related entries in the VARIoT vulnerabilities database: VAR-202404-0069, VAR-202404-0070

Trust: 5.5

Fetched: July 7, 2024, 9:11 a.m., Published: April 12, 2024, 4:40 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: d-link model: dnr-326
vendor: d-link model: dns-320
vendor: d-link model: dns-320lw
vendor: d-link model: dns-320l
vendor: d-link model: dns-325
vendor: d-link model: dns-323
vendor: d-link model: dns-340l
vendor: d-link model: dns-345
vendor: d-link model: dns-327l
vendor: d-link model: dnr-322l
vendor: dlink model: dnr-326
vendor: dlink model: dns-320
vendor: dlink model: dns-320lw
vendor: dlink model: dns-320l
vendor: dlink model: dns-325
vendor: dlink model: dns-323
vendor: dlink model: dns-340l
vendor: dlink model: dns-345
vendor: dlink model: dns-327l
vendor: dlink model: dnr-322l
db: NVD ids: CVE-2024-3272, CVE-2024-3273