VARIoT news about IoT security

Trust: 3.25

Fetched: Jan. 19, 2024, 9:40 a.m., Published: Jan. 10, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 3.25

Fetched: Jan. 19, 2024, 9:29 a.m., Published: Jan. 19, 9305, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 3.5

Fetched: Jan. 19, 2024, 9:29 a.m., Published: Jan. 16, 2024, 3:07 p.m.
Vulnerabilities: command injection, authentication bypass
Affected productsExternal IDs
db: NVD ids: CVE-2024-21887, CVE-2023-46805

Trust: 4.25

Fetched: Jan. 19, 2024, 9:24 a.m., Published: Jan. 10, 2024, 3:55 p.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs

Trust: 3.75

Fetched: Jan. 19, 2024, 9:23 a.m., Published: Jan. 18, 2024, 10:12 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: ipad
vendor: apple model: macbook
vendor: apple model: macbook air
vendor: apple model: iphone
db: NVD ids: CVE-2023-4969
Related entries in the VARIoT vulnerabilities database: VAR-202401-1629, VAR-202401-2573

Trust: 5.5

Fetched: Jan. 19, 2024, 9:22 a.m., Published: Jan. 16, 2024, 11:45 p.m.
Vulnerabilities: code execution, denial of service
Affected productsExternal IDs
vendor: citrix model: netscaler gateway
vendor: citrix model: gateway
vendor: citrix model: netscaler
vendor: citrix model: application delivery controller
vendor: citrix model: netscaler application delivery controller
vendor: citrix model: netscaler adc
db: NVD ids: CVE-2023-6549, CVE-2023-4966, CVE-2023-6548, CVE-2024-6549

Trust: 5.0

Fetched: Jan. 19, 2024, 9:22 a.m., Published: Jan. 10, 2024, 3:55 p.m.
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: cisco model: wireless access point
vendor: cisco model: wap371

Trust: 3.75

Fetched: Jan. 19, 2024, 9:12 a.m., Published: Jan. 10, 2024, 3:55 p.m.
Vulnerabilities: file upload vulnerability
Affected productsExternal IDs
vendor: cisco model: cisco unity
vendor: cisco model: cisco unity connection
vendor: cisco model: unity connection
vendor: cisco model: unity
Related entries in the VARIoT vulnerabilities database: VAR-201609-0325

Trust: 4.5

Fetched: Jan. 19, 2024, 9:10 a.m., Published: Jan. 4, 2024, midnight
Vulnerabilities: information disclosure
Affected productsExternal IDs
vendor: sourcefire model: snort
vendor: snort model: snort
vendor: cisco systems model: series
vendor: cisco systems model: catalyst
vendor: cisco systems model: catalyst 6500
vendor: cisco systems model: catalyst 6500 series
vendor: cisco systems model: ips sensor
vendor: cisco systems model: firewall services module
vendor: cisco systems model: 7600 series
vendor: cisco systems model: cisco intrusion prevention system
vendor: cisco systems model: fwsm
vendor: cisco systems model: series routers
vendor: cisco systems model: cisco catalyst 6500 series
vendor: cisco systems model: cisco security manager
vendor: cisco systems model: adaptive security appliance
vendor: cisco systems model: cisco ios
vendor: cisco systems model: asa 5500
vendor: cisco systems model: sourcefire snort
vendor: cisco systems model: routers
vendor: cisco systems model: cisco adaptive security appliance
vendor: cisco systems model: intrusion prevention system
vendor: cisco systems model: cisco 7600 series
vendor: cisco systems model: access points
vendor: cisco systems model: ios software
vendor: cisco systems model: security manager
vendor: cisco systems model: series switches
vendor: cisco systems model: ios-xe software
vendor: cisco model: series
vendor: cisco model: catalyst
vendor: cisco model: catalyst 6500
vendor: cisco model: catalyst 6500 series
vendor: cisco model: ips sensor
vendor: cisco model: firewall services module
vendor: cisco model: 7600 series
vendor: cisco model: cisco intrusion prevention system
vendor: cisco model: fwsm
vendor: cisco model: series routers
vendor: cisco model: cisco catalyst 6500 series
vendor: cisco model: cisco security manager
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco ios
vendor: cisco model: asa 5500
vendor: cisco model: sourcefire snort
vendor: cisco model: routers
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: intrusion prevention system
vendor: cisco model: cisco 7600 series
vendor: cisco model: access points
vendor: cisco model: ios software
vendor: cisco model: security manager
vendor: cisco model: series switches
vendor: cisco model: ios-xe software
db: NVD ids: CVE-2016-6415
db: CISCO ids: CISCO-SA-20160916-IKEV1

Trust: 3.0

Fetched: Jan. 19, 2024, 9:09 a.m., Published: Jan. 23, 2020, 1 p.m.
Vulnerabilities: -
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-201808-0161

Trust: 4.75

Fetched: Jan. 17, 2024, 10:33 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: d-link model: dcs-825l
vendor: d-link model: eyeon baby monitor
db: NVD ids: CVE-2017-11563

Trust: 4.0

Fetched: Jan. 17, 2024, 10:31 a.m., Published: Jan. 8, 2024, 7:53 p.m.
Vulnerabilities: memory corruption, sql injection, code execution
Affected productsExternal IDs
vendor: palo model: networks
vendor: samsung model: mobile
vendor: samsung model: notes
vendor: samsung model: mobile devices
vendor: symantec model: antivirus
vendor: palo alto networks model: networks
vendor: sonicwall model: remote access
vendor: cisco model: router
vendor: cisco model: routers
vendor: cisco model: small business

Trust: 4.5

Fetched: Jan. 17, 2024, 10:30 a.m., Published: Jan. 16, 2024, midnight
Vulnerabilities: sql injection, path traversal, cross-site scripting...
Affected productsExternal IDs
vendor: trend model: security
vendor: squid model: squid
vendor: zoho model: manageengine applications manager
vendor: trend micro model: security
db: NVD ids: CVE-2023-38333, CVE-2020-11978, CVE-2023-44466, CVE-2023-52326, CVE-2023-52325, CVE-2023-46847, CVE-2023-30258, CVE-2023-32707, CVE-2023-22273, CVE-2023-49085

Trust: 5.0

Fetched: Jan. 17, 2024, 10:30 a.m., Published: Jan. 10, 2024, 2:45 p.m.
Vulnerabilities: input validation flaw
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916

Trust: 4.75

Fetched: Jan. 17, 2024, 10:24 a.m., Published: -
Vulnerabilities: default password
Affected productsExternal IDs
vendor: trend model: security
vendor: enphase model: envoy
vendor: trend micro model: security

Trust: 3.5

Fetched: Jan. 17, 2024, 10:23 a.m., Published: Jan. 4, 2024, midnight
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: sophos model: sophos anti-virus
vendor: sophos model: firewall
vendor: sophos model: anti-virus

Trust: 5.25

Fetched: Jan. 17, 2024, 10:18 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: command injection, feature bypass, privilege elevation...
Affected productsExternal IDs
vendor: novell model: client
vendor: cisco model: series
vendor: cisco model: information server
vendor: hitachi model: hirdb
vendor: hitachi model: web server
vendor: hitachi model: jp1/performance management
vendor: hitachi model: ucosminexus application server
db: NVD ids: CVE-2013-0005, CVE-2010-3332, CVE-2002-0054, CVE-2002-0074, CVE-2001-0902, CVE-2014-4078, CVE-2000-0886, CVE-2005-2678, CVE-2010-1899, CVE-2001-0333, CVE-2002-0149, CVE-2002-1745, CVE-2013-0941, CVE-2002-1181, CVE-2002-0075, CVE-2023-3440, CVE-2002-0073, CVE-2002-0869, CVE-2005-2089, CVE-2005-0871, CVE-2001-0507, CVE-2001-1186, CVE-2005-4360, CVE-2001-0709, CVE-2007-2897, CVE-2006-5858, CVE-2000-0304, CVE-2002-0071, CVE-2008-1436, CVE-2009-1536, CVE-2004-0928, CVE-2002-1717, CVE-2001-0146, CVE-2009-2509, CVE-2001-0500, CVE-2002-1790, CVE-2010-3972, CVE-2003-0904, CVE-2000-0097, CVE-2008-4300, CVE-2002-1718, CVE-1999-1544, CVE-2010-1886, CVE-2010-3229, CVE-2003-0225, CVE-2008-4301, CVE-2002-1694, CVE-2016-0152, CVE-2002-0148, CVE-2003-1566, CVE-2019-0941, CVE-2010-1256, CVE-2003-0718, CVE-2012-2531, CVE-2004-0205, CVE-1999-1011, CVE-2001-1243, CVE-2002-0147, CVE-2002-0079, CVE-2011-3414, CVE-2009-4445, CVE-2003-0226, CVE-2002-1182, CVE-2003-1582, CVE-2001-0337, CVE-2006-1394, CVE-2012-2532, CVE-2009-2521, CVE-2014-4072, CVE-2023-6352, CVE-2003-0223, CVE-2009-1535, CVE-2007-0087, CVE-2002-1795, CVE-2001-0336, CVE-2003-1567, CVE-2000-0858, CVE-2001-0506, CVE-2006-0026, CVE-2003-0224, CVE-2003-0349, CVE-2000-0942, CVE-2017-7269, CVE-2008-0075, CVE-1999-0682, CVE-2010-2731, CVE-2009-3023, CVE-2009-4444, CVE-2003-1306, CVE-2002-0072, CVE-2006-6579, CVE-2010-2730, CVE-2007-2815, CVE-2002-1744, CVE-2008-1446, CVE-2002-1876, CVE-2011-2012, CVE-2009-1122, CVE-2011-1068, CVE-2004-1312, CVE-2009-3555, CVE-1999-1591, CVE-2003-0109, CVE-2002-0530, CVE-2002-1908, CVE-2002-0224, CVE-2011-5279, CVE-2007-1278, CVE-2008-0074, CVE-2006-6578, CVE-2003-0227, CVE-2002-0862, CVE-2017-0055, CVE-2019-1365, CVE-2004-0574, CVE-2015-1635, CVE-2000-1090, CVE-2020-0645, CVE-2002-0150

Trust: 4.5

Fetched: Jan. 17, 2024, 10:17 a.m., Published: Jan. 11, 2024, midnight
Vulnerabilities: authentication bypass, command injection, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-46805, CVE-2024-21887

Trust: 3.25

Fetched: Jan. 17, 2024, 10:13 a.m., Published: Jan. 8, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 3.25

Fetched: Jan. 17, 2024, 10:07 a.m., Published: Jan. 9, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios