VARIoT news about IoT security

Trust: 3.5

Fetched: Jan. 16, 2024, 9:15 a.m., Published: May 16, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trane model: thermostat
vendor: trane model: comfortlink ii
vendor: smarter model: coffee
vendor: rising model: antivirus
vendor: google model: wifi
vendor: google model: home

Trust: 3.25

Fetched: Jan. 14, 2024, 10:37 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2011-0638

Trust: 3.25

Fetched: Jan. 14, 2024, 10:36 a.m., Published: Jan. 5, 2024, 10:45 p.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs
db: NVD ids: CVE-2023-29357

Trust: 4.25

Fetched: Jan. 14, 2024, 10:33 a.m., Published: Jan. 12, 2024, 10:28 p.m.
Vulnerabilities: authentication bypass, command injection, code execution
Affected productsExternal IDs
vendor: trend micro model: security
vendor: pulsesecure model: policy secure
vendor: pulsesecure model: pulse connect secure
vendor: pulsesecure model: connect secure
vendor: trend model: security
db: NVD ids: CVE-2023-46805, CVE-2024-21887

Trust: 3.5

Fetched: Jan. 14, 2024, 10:32 a.m., Published: Dec. 21, 2023, 8:51 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: home assistant model: home assistant

Trust: 3.25

Fetched: Jan. 14, 2024, 10:31 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2021-1497

Trust: 6.25

Fetched: Jan. 14, 2024, 10:28 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: kernel panic, code execution, improper validation...
Affected productsExternal IDs
vendor: cisco model: unity
vendor: cisco model: unified computing system
vendor: cisco model: cisco unified computing system
vendor: cisco model: cisco integrated management controller
vendor: cisco model: guard
vendor: cisco model: integrated management controller
vendor: parallels model: tools
vendor: emerson model: avocent mergepoint unity
vendor: emerson model: network power avocent mergepoint unity 2016
vendor: emerson network power model: avocent mergepoint unity
vendor: emerson network power model: network power avocent mergepoint unity 2016
vendor: canonical model: ubuntu
vendor: aten model: cn8000
vendor: aten model: kh1516i ip kvm switch
vendor: aten model: kn9116 ip kvm switch
db: NVD ids: CVE-2021-37576, CVE-2020-27777, CVE-2018-10853, CVE-2013-1943, CVE-2013-5634, CVE-2011-1773, CVE-2020-10756, CVE-2021-4095, CVE-2013-1186, CVE-2021-42073, CVE-2015-2877, CVE-2012-4073, CVE-2010-0297, CVE-2009-2287, CVE-2015-5307, CVE-2011-0011, CVE-2011-4127, CVE-2021-22543, CVE-2022-4636, CVE-2019-11135, CVE-2014-0142, CVE-2020-24628, CVE-2009-3290, CVE-2014-3645, CVE-2022-1158, CVE-2014-3601, CVE-2010-0430, CVE-2013-1798, CVE-2010-0309, CVE-2017-2584, CVE-2016-3713, CVE-2013-7130, CVE-2013-1935, CVE-2009-3722, CVE-2011-1750, CVE-2020-12768, CVE-2016-4440, CVE-2021-3501, CVE-2012-2137, CVE-2020-8834, CVE-2011-4622, CVE-2019-19332, CVE-2017-12188, CVE-2021-4032, CVE-2016-9777, CVE-2014-8480, CVE-2015-8345, CVE-2013-1766, CVE-2017-8106, CVE-2010-2784, CVE-2014-8369, CVE-2007-1320, CVE-2021-3653, CVE-2014-3080, CVE-2012-4117, CVE-2019-3016, CVE-2010-0306, CVE-2009-1242, CVE-2012-4461, CVE-2009-1472, CVE-2010-3881, CVE-2013-4129, CVE-2023-25530, CVE-2011-2212, CVE-2014-7842, CVE-2023-25527, CVE-2014-3611, CVE-2020-36313, CVE-2023-4155, CVE-2014-1997, CVE-2009-3616, CVE-2017-2596, CVE-2009-3640, CVE-2009-1473, CVE-2013-2007, CVE-2017-15306, CVE-2022-45869, CVE-2016-3044, CVE-2011-2512, CVE-2021-21731, CVE-2017-17741, CVE-2012-4116, CVE-2010-0741, CVE-2023-31029, CVE-2012-2652, CVE-2016-0749, CVE-2021-3656, CVE-2019-3887, CVE-2015-7513, CVE-2015-5156, CVE-2012-0045, CVE-2022-0171, CVE-2018-16882, CVE-2021-30178, CVE-2019-12491, CVE-2017-12168, CVE-2013-6368, CVE-2012-4115, CVE-2015-8104, CVE-2015-1950, CVE-2009-3638, CVE-2023-31024, CVE-2020-24627, CVE-2013-6376, CVE-2018-12904, CVE-2014-8481, CVE-2012-4072, CVE-2010-0435, CVE-2017-1000407, CVE-2015-3214, CVE-2016-8630, CVE-2020-2732, CVE-2010-5313, CVE-2019-7222, CVE-2019-14821, CVE-2022-2196, CVE-2017-7518, CVE-2013-4587, CVE-2020-36311, CVE-2021-29657, CVE-2014-8134, CVE-2010-0431, CVE-2022-1789, CVE-2017-2583, CVE-2015-3247, CVE-2014-0143, CVE-2010-3698, CVE-2010-0428, CVE-2022-3344, CVE-2010-0419, CVE-2021-42075, CVE-2020-36310, CVE-2013-6367, CVE-2014-0155, CVE-2012-1179, CVE-2020-36312, CVE-2021-4093, CVE-2017-12154, CVE-2012-2121, CVE-2023-1513, CVE-2021-43056, CVE-2015-3324, CVE-2008-2004, CVE-2008-4539, CVE-2023-30456, CVE-2018-19406, CVE-2012-2119, CVE-2015-0239, CVE-2022-2153, CVE-2022-1263, CVE-2021-42074, CVE-2021-44776, CVE-2010-0429, CVE-2016-9756, CVE-2021-42076, CVE-2014-0049, CVE-2013-0311, CVE-2015-3252, CVE-2014-3690, CVE-2011-2527, CVE-2004-2627, CVE-2009-1477, CVE-2010-4525, CVE-2016-9588, CVE-2010-2653, CVE-2012-0029, CVE-2012-1601, CVE-2015-4036, CVE-2013-1922, CVE-2021-42072, CVE-2008-2382, CVE-2013-1797, CVE-2023-5090, CVE-2009-4004, CVE-2016-10150, CVE-2015-4692, CVE-2023-25529, CVE-2022-39189, CVE-2023-2680, CVE-2011-1751, CVE-2022-1852, CVE-2014-8086, CVE-2019-7221, CVE-2015-5260, CVE-2021-38198, CVE-2009-1474, CVE-2014-3646, CVE-2023-31030, CVE-2022-0516, CVE-2010-0298, CVE-2009-4031, CVE-2014-3610, CVE-2021-20295, CVE-2015-3456, CVE-2021-3750, CVE-2018-12473, CVE-2019-6974, CVE-2017-1000252, CVE-2018-19407, CVE-2014-3615, CVE-2014-3647, CVE-2012-4114, CVE-2020-3993, CVE-2018-18021, CVE-2013-1796, CVE-2013-6030, CVE-2013-2069, CVE-2018-1087, CVE-2020-27152, CVE-2013-0526, CVE-2011-4347, CVE-2013-4592, CVE-2016-5412, CVE-2018-10901
Related entries in the VARIoT vulnerabilities database: VAR-202402-0004, VAR-202401-0197, VAR-202401-0682, VAR-202402-0006, VAR-202401-0196

Trust: 4.5

Fetched: Jan. 14, 2024, 10:27 a.m., Published: Jan. 12, 2024, 1:19 p.m.
Vulnerabilities: default credentials, code execution
Affected productsExternal IDs
vendor: horner automation model: cscape
vendor: horner automation model: automation cscape
vendor: schneider electric model: monitor
vendor: schneider model: monitor
vendor: siemens model: simatic
vendor: siemens model: simatic ipc847e
vendor: siemens model: simatic ipc647e
vendor: horner model: cscape
vendor: horner model: automation cscape
vendor: rapid model: scada
vendor: rapid model: rapid scada
vendor: rapid scada model: scada
vendor: rapid scada model: rapid scada
db: NVD ids: CVE-2024-21764, CVE-2023-49621, CVE-2023-7206, CVE-2023-51438, CVE-2023-7032, CVE-2024-21852, CVE-2023-49251

Trust: 4.5

Fetched: Jan. 14, 2024, 10:21 a.m., Published: -
Vulnerabilities: buffer overflow, command injection
Affected productsExternal IDs
db: NVD ids: CVE-2023-46445, CVE-2023-48795, CVE-2023-46446

Trust: 4.5

Fetched: Jan. 14, 2024, 10:12 a.m., Published: Jan. 4, 2024, 6 p.m.
Vulnerabilities: authentication bypass, command injection, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-46805, CVE-2024-21887

Trust: 4.0

Fetched: Jan. 14, 2024, 10:07 a.m., Published: Dec. 26, 2023, 3:17 p.m.
Vulnerabilities: address disclosure
Affected productsExternal IDs

Trust: 3.25

Fetched: Jan. 14, 2024, 10:07 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2022-45143
Related entries in the VARIoT vulnerabilities database: VAR-201512-0402, VAR-202304-0151, VAR-201710-0659, VAR-201504-0294, VAR-201501-0247, VAR-201810-0344, VAR-202010-0386, VAR-201810-0582, VAR-201908-0046, VAR-201808-0119, VAR-200512-0678, VAR-202205-1787, VAR-201508-0392, VAR-201404-0168, VAR-200909-0385, VAR-200609-0071, VAR-200505-0128, VAR-202312-0198, VAR-201310-0484, VAR-201709-0004, VAR-200511-0061, VAR-200206-0066, VAR-201507-0089, VAR-202211-1910, VAR-202002-0611, VAR-200305-0024, VAR-201406-0313, VAR-200603-0272, VAR-201411-0131, VAR-200511-0015, VAR-201101-0306, VAR-201804-0203, VAR-201310-0534, VAR-200511-0112, VAR-201311-0291, VAR-201905-1319, VAR-201101-0330, VAR-200106-0093, VAR-200407-0043, VAR-200210-0273, VAR-202106-0146, VAR-201205-0331, VAR-200511-0016, VAR-202003-1187, VAR-202204-1420, VAR-200506-0141, VAR-201011-0069, VAR-201006-0026, VAR-201804-1019, VAR-201309-0394, VAR-201002-0164, VAR-201311-0232, VAR-201707-0436, VAR-200905-0155, VAR-202006-1087, VAR-201605-0554, VAR-201309-0039, VAR-202107-0092, VAR-201702-0117, VAR-201208-0125, VAR-200210-0245, VAR-200711-0141, VAR-200905-0196, VAR-200211-0071, VAR-201209-0394, VAR-200401-0045, VAR-202002-0581, VAR-201505-0238, VAR-201611-0173, VAR-200505-0908, VAR-201105-0256, VAR-201704-1346, VAR-201808-0121, VAR-201804-0218, VAR-201609-0597, VAR-202205-0133, VAR-201702-1059, VAR-201808-0120, VAR-201404-0031, VAR-200511-0110, VAR-201705-3726, VAR-201804-0510, VAR-201305-0115, VAR-202007-0194, VAR-200704-0585, VAR-200511-0111, VAR-201608-0272, VAR-202204-1973, VAR-201209-0366, VAR-201003-0231, VAR-201508-0132, VAR-202204-0921, VAR-201610-0225, VAR-201208-0707, VAR-201208-0126, VAR-202209-0516, VAR-201912-0092, VAR-202002-0612, VAR-200801-0305, VAR-202010-1490, VAR-201808-0956, VAR-202201-1944, VAR-200809-0316, VAR-202007-0193, VAR-201506-0163, VAR-202002-0610, VAR-201904-0204, VAR-201506-0188, VAR-202109-0790

Trust: 5.25

Fetched: Jan. 14, 2024, 9:52 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: kernel panic, code execution, improper validation...
Affected productsExternal IDs
vendor: cisco model: rv130w
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: 5500 series adaptive security appliance
vendor: cisco model: pix firewall
vendor: cisco model: cisco asa 5500 series
vendor: cisco model: nexus
vendor: cisco model: vpn 3000 series
vendor: cisco model: routers
vendor: cisco model: cisco unified callmanager
vendor: cisco model: series switches
vendor: cisco model: rv130
vendor: cisco model: series
vendor: cisco model: ios xe
vendor: cisco model: clamav
vendor: cisco model: series switch
vendor: cisco model: adaptive security virtual appliance
vendor: cisco model: staros
vendor: cisco model: cisco pix 500 series security appliance
vendor: cisco model: ios xr
vendor: cisco model: asa 5500 series
vendor: cisco model: rv215w
vendor: cisco model: 1000v
vendor: cisco model: catalyst 6500
vendor: cisco model: asa 1000v cloud firewall
vendor: cisco model: series routers
vendor: cisco model: rv110w
vendor: cisco model: asr 5000
vendor: cisco model: vpn client
vendor: cisco model: cisco small business
vendor: cisco model: 7600 series
vendor: cisco model: unified presence
vendor: cisco model: series integrated services routers
vendor: cisco model: cisco nx-os
vendor: cisco model: cisco staros
vendor: cisco model: vpn 3002 hardware client
vendor: cisco model: cisco 7600 series
vendor: cisco model: isr g2 routers
vendor: cisco model: ios xr software
vendor: cisco model: ios xe software
vendor: cisco model: unified presence server
vendor: cisco model: packet data network gateway
vendor: cisco model: 4321
vendor: cisco model: firepower
vendor: cisco model: cisco anyconnect secure mobility client
vendor: cisco model: vpn 3000 concentrator
vendor: cisco model: soho
vendor: cisco model: cisco unified presence server
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: cisco virtualized packet core
vendor: cisco model: netscaler gateway
vendor: cisco model: catalyst 6500 series
vendor: cisco model: catalyst
vendor: cisco model: catalyst 9800
vendor: cisco model: pix 500
vendor: cisco model: pix 500 series security appliance
vendor: cisco model: cisco catalyst 6500 series
vendor: cisco model: firepower 2100
vendor: cisco model: integrated services routers
vendor: cisco model: cisco unified presence
vendor: cisco model: virtualized packet core
vendor: cisco model: ios xe 3.15
vendor: cisco model: technical support
vendor: cisco model: firepower 9300
vendor: cisco model: asa software
vendor: cisco model: ios 12.2
vendor: cisco model: industrial security appliance
vendor: cisco model: firepower threat defense
vendor: cisco model: router
vendor: cisco model: cisco asa 1000v cloud firewall
vendor: cisco model: ios software
vendor: cisco model: cisco vpn 3000 series
vendor: cisco model: adaptive security appliance
vendor: cisco model: small business
vendor: cisco model: isr g2
vendor: cisco model: cisco pix firewall
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: aggregation services router
vendor: cisco model: unified callmanager
vendor: cisco model: cisco ios xr
vendor: cisco model: nx-os
vendor: cisco model: asa 5500
vendor: cisco model: mds 9000
vendor: rockwell model: factorytalk
vendor: rockwell model: factorytalk view se
vendor: rockwell model: factorytalk view
vendor: nortel model: contivity
vendor: cups model: cups
vendor: clavister model: security gateway
vendor: clavister model: firewall
vendor: ingate model: siparator
vendor: ingate model: ingate firewall
vendor: ingate model: firewall
vendor: zyxel model: zywall
vendor: clamav model: clamav
vendor: apple model: apple mac os x
vendor: apple model: cups
vendor: apple model: mac os x
vendor: apple model: mac os
vendor: seil model: b1 firmware
vendor: seil model: seil/b1
vendor: seil model: seil/x2
vendor: seil model: seil/neu 2fe plus
vendor: seil model: neu 2fe plus
vendor: seil model: seil/turbo
vendor: seil model: seil/x86
vendor: seil model: turbo
vendor: seil model: seil/x1
vendor: innominate model: mguard
vendor: cisco systems model: rv130w
vendor: cisco systems model: anyconnect secure mobility client
vendor: cisco systems model: 5500 series adaptive security appliance
vendor: cisco systems model: pix firewall
vendor: cisco systems model: cisco asa 5500 series
vendor: cisco systems model: nexus
vendor: cisco systems model: vpn 3000 series
vendor: cisco systems model: routers
vendor: cisco systems model: cisco unified callmanager
vendor: cisco systems model: series switches
vendor: cisco systems model: rv130
vendor: cisco systems model: series
vendor: cisco systems model: ios xe
vendor: cisco systems model: clamav
vendor: cisco systems model: series switch
vendor: cisco systems model: adaptive security virtual appliance
vendor: cisco systems model: staros
vendor: cisco systems model: cisco pix 500 series security appliance
vendor: cisco systems model: ios xr
vendor: cisco systems model: asa 5500 series
vendor: cisco systems model: rv215w
vendor: cisco systems model: 1000v
vendor: cisco systems model: catalyst 6500
vendor: cisco systems model: asa 1000v cloud firewall
vendor: cisco systems model: series routers
vendor: cisco systems model: rv110w
vendor: cisco systems model: asr 5000
vendor: cisco systems model: vpn client
vendor: cisco systems model: cisco small business
vendor: cisco systems model: 7600 series
vendor: cisco systems model: unified presence
vendor: cisco systems model: series integrated services routers
vendor: cisco systems model: cisco nx-os
vendor: cisco systems model: cisco staros
vendor: cisco systems model: vpn 3002 hardware client
vendor: cisco systems model: cisco 7600 series
vendor: cisco systems model: isr g2 routers
vendor: cisco systems model: ios xr software
vendor: cisco systems model: ios xe software
vendor: cisco systems model: unified presence server
vendor: cisco systems model: packet data network gateway
vendor: cisco systems model: 4321
vendor: cisco systems model: firepower
vendor: cisco systems model: cisco anyconnect secure mobility client
vendor: cisco systems model: vpn 3000 concentrator
vendor: cisco systems model: soho
vendor: cisco systems model: cisco unified presence server
vendor: cisco systems model: cisco ios xe
vendor: cisco systems model: cisco ios
vendor: cisco systems model: cisco virtualized packet core
vendor: cisco systems model: netscaler gateway
vendor: cisco systems model: catalyst 6500 series
vendor: cisco systems model: catalyst
vendor: cisco systems model: catalyst 9800
vendor: cisco systems model: pix 500
vendor: cisco systems model: pix 500 series security appliance
vendor: cisco systems model: cisco catalyst 6500 series
vendor: cisco systems model: firepower 2100
vendor: cisco systems model: integrated services routers
vendor: cisco systems model: cisco unified presence
vendor: cisco systems model: virtualized packet core
vendor: cisco systems model: ios xe 3.15
vendor: cisco systems model: technical support
vendor: cisco systems model: firepower 9300
vendor: cisco systems model: asa software
vendor: cisco systems model: ios 12.2
vendor: cisco systems model: industrial security appliance
vendor: cisco systems model: firepower threat defense
vendor: cisco systems model: router
vendor: cisco systems model: cisco asa 1000v cloud firewall
vendor: cisco systems model: ios software
vendor: cisco systems model: cisco vpn 3000 series
vendor: cisco systems model: adaptive security appliance
vendor: cisco systems model: small business
vendor: cisco systems model: isr g2
vendor: cisco systems model: cisco pix firewall
vendor: cisco systems model: cisco adaptive security appliance
vendor: cisco systems model: aggregation services router
vendor: cisco systems model: unified callmanager
vendor: cisco systems model: cisco ios xr
vendor: cisco systems model: nx-os
vendor: cisco systems model: asa 5500
vendor: cisco systems model: mds 9000
vendor: novell model: client
vendor: novell model: bordermanager
vendor: mikrotik model: routers
vendor: mikrotik model: routeros
vendor: mikrotik model: router
vendor: forcepoint model: ngfw security management center
vendor: forcepoint model: next generation firewall
vendor: huawei model: secospace usg6600
vendor: huawei model: usg2205bsr
vendor: huawei model: huawei
vendor: huawei model: usg2220bsr
vendor: huawei model: ngfw
vendor: huawei model: usg9500
vendor: huawei model: nip6800
vendor: huawei model: nova
vendor: huawei model: usg5120bsr
vendor: huawei model: usg5150bsr
vendor: fortigate model: fortios
vendor: sonicwall model: switch
vendor: sonicwall model: soho
vendor: sonicwall model: ssl vpn
vendor: sonicwall model: remote access
vendor: wireshark model: wireshark
vendor: phoenix contact model: mguard
vendor: citrix model: netscaler gateway
vendor: citrix model: application delivery controller
vendor: citrix model: gateway
vendor: citrix model: netscaler
vendor: citrix model: netscaler application delivery controller
vendor: brocade model: brocade netiron os
vendor: brocade model: netiron os
vendor: netbsd model: current
vendor: netbsd model: netbsd
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: factorytalk view se
vendor: rockwell automation model: factorytalk view
vendor: check point model: next generation
vendor: check point model: check point
vendor: check point model: security gateway
vendor: sophos model: mobile
vendor: sophos model: firewall
vendor: sophos model: sophos utm
db: NVD ids: CVE-2015-6429, CVE-2004-0819, CVE-2012-5379, CVE-2012-5382, CVE-2011-2147, CVE-2023-20051, CVE-2017-12289, CVE-2023-28842, CVE-2023-20193, CVE-2015-0675, CVE-2014-6385, CVE-2007-2524, CVE-2018-0472, CVE-2020-1657, CVE-2006-4436, CVE-2018-15397, CVE-2019-6143, CVE-2023-38710, CVE-2017-17305, CVE-2006-4018, CVE-2005-4570, CVE-2015-3204, CVE-2006-5201, CVE-2022-0910, CVE-2015-3966, CVE-2014-0612, CVE-2009-2868, CVE-2006-4613, CVE-2005-1802, CVE-2006-5286, CVE-2023-49692, CVE-2013-5172, CVE-2023-41085, CVE-2011-1784, CVE-2019-0060, CVE-2006-1268, CVE-2011-4667, CVE-2005-3732, CVE-2002-0603, CVE-2004-2230, CVE-2022-22201, CVE-2015-5080, CVE-2022-23746, CVE-2020-1829, CVE-2010-0392, CVE-2005-4321, CVE-2003-0258, CVE-2008-2246, CVE-2018-8753, CVE-2014-3299, CVE-2006-0383, CVE-2022-0286, CVE-2014-8952, CVE-2012-5383, CVE-2012-5378, CVE-2005-3669, CVE-2010-4692, CVE-2016-10455, CVE-2013-5507, CVE-2023-28841, CVE-2005-3668, CVE-2000-0962, CVE-2012-5381, CVE-2013-5548, CVE-2013-0406, CVE-2019-1706, CVE-2010-4676, CVE-2001-0376, CVE-2004-0710, CVE-2005-3753, CVE-2018-6916, CVE-2002-1102, CVE-2020-11176, CVE-2020-1749, CVE-2011-4231, CVE-2006-0905, CVE-2005-3670, CVE-2020-3190, CVE-2023-4398, CVE-2023-1707, CVE-2022-20679, CVE-2005-2025, CVE-2010-4354, CVE-2009-4922, CVE-2018-0273, CVE-2004-0219, CVE-2001-0284, CVE-2022-3625, CVE-2013-4709, CVE-2003-0242, CVE-1999-0727, CVE-2004-2678, CVE-2010-0567, CVE-2008-4190, CVE-2013-6694, CVE-2009-0346, CVE-2012-5380, CVE-2008-1205, CVE-2019-5613, CVE-2018-17977, CVE-2017-3865, CVE-2009-2918, CVE-2007-3157, CVE-2002-0414, CVE-2009-1632, CVE-2020-3220, CVE-2016-1379, CVE-2009-3675, CVE-2005-0398, CVE-2020-12142, CVE-2022-27666, CVE-2020-10769, CVE-2013-1028, CVE-2020-20262, CVE-2022-3635, CVE-2016-8492, CVE-2012-2499, CVE-2019-18934, CVE-2002-1092, CVE-2007-6094, CVE-2023-28840, CVE-2009-1574, CVE-2002-0666, CVE-2012-3915, CVE-2003-1004, CVE-2018-25062, CVE-2008-1198, CVE-2020-1816, CVE-2015-4047, CVE-2017-17023, CVE-2013-3876, CVE-2016-6466, CVE-2006-4331, CVE-2005-0039, CVE-2023-47091, CVE-2011-1547, CVE-2022-3630, CVE-2017-6609, CVE-2017-17312, CVE-2016-10448, CVE-2008-1335, CVE-2013-2237, CVE-2016-2183, CVE-2022-29473, CVE-2017-6297, CVE-2017-17311, CVE-2021-34579, CVE-2012-5032, CVE-2007-3248, CVE-2004-0164, CVE-2005-3666, CVE-2017-8338, CVE-2016-10396, CVE-2006-0718, CVE-2009-0790, CVE-2018-9511, CVE-2017-6156, CVE-2013-1241, CVE-2020-12028, CVE-2007-1826, CVE-2005-3667, CVE-2016-5736, CVE-2015-6111, CVE-2012-5377, CVE-2022-20742, CVE-2005-4090, CVE-2022-3545, CVE-2021-28508, CVE-2012-3727, CVE-2010-0578, CVE-2021-1422, CVE-2008-3652, CVE-2015-6510, CVE-2007-6282, CVE-2022-27270, CVE-2013-4350, CVE-2018-0753, CVE-2016-8203, CVE-2012-1370, CVE-2009-0304, CVE-2020-25645, CVE-2013-2234, CVE-2008-3651, CVE-2023-22413, CVE-2012-2500, CVE-2022-20923, CVE-2018-6918, CVE-2019-6147, CVE-2020-1830, CVE-2008-0324, CVE-2020-5938, CVE-2018-9129, CVE-2022-23024, CVE-2008-2733, CVE-2020-12027, CVE-2023-22417, CVE-2015-0771, CVE-2020-1828, CVE-2007-1841, CVE-2019-8456, CVE-2022-3624, CVE-2005-2359, CVE-2015-4550, CVE-2021-23039

Trust: 5.5

Fetched: Jan. 14, 2024, 9:51 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: information leak, denial of service, directory traversal...
Affected productsExternal IDs
vendor: cisco model: d9800 network transport receiver
vendor: cisco model: d9800
vendor: cisco model: 1100
vendor: dbpower model: u818a wifi
vendor: dbpower model: u818a
vendor: vivotek model: vivotek fd8136
vendor: vivotek model: fd8136
vendor: d-link model: dcs-1130
vendor: d-link model: dsr-250n
vendor: d-link model: dcs-1100
vendor: jantek model: jtc-200
vendor: moxa model: awk-3131a
vendor: moxa model: moxa awk-3131a
vendor: moxa model: awk-3131a firmware
vendor: raritan model: dominion
vendor: telestar model: imperial i500-bt
vendor: telestar model: imperial i150
vendor: telestar model: bobs rock radio
vendor: telestar model: dabman d10
vendor: telestar model: imperial i600
vendor: telestar model: imperial i110
vendor: telestar model: imperial i450
vendor: telestar model: dabman i30 stereo
vendor: telestar model: imperial i200-cd
vendor: telestar model: imperial i200
vendor: telestar model: imperial i400
vendor: honeywell model: intermec pm23
vendor: hospira model: lifecare pca infusion system
vendor: arris model: nvg599
vendor: arris model: nvg589
db: NVD ids: CVE-2023-42363, CVE-2017-8415, CVE-2017-15874, CVE-2017-14115, CVE-2015-3459, CVE-2021-42376, CVE-2018-20679, CVE-2012-6614, CVE-2022-30065, CVE-2022-28391, CVE-2021-42378, CVE-2021-33530, CVE-2005-2136, CVE-2018-14494, CVE-2017-15873, CVE-2021-42382, CVE-2015-9261, CVE-2016-2148, CVE-2021-42385, CVE-2016-5791, CVE-2017-16544, CVE-2021-42373, CVE-2018-1000517, CVE-2013-1813, CVE-2006-5050, CVE-2017-14116, CVE-2019-16734, CVE-2021-42384, CVE-2019-13473, CVE-2021-37555, CVE-2017-5671, CVE-2016-2147, CVE-2011-2716, CVE-2021-42377, CVE-2021-42379, CVE-2018-0099, CVE-2023-42364, CVE-2021-42374, CVE-2021-42375, CVE-2021-28831, CVE-2023-42366, CVE-2022-48174, CVE-2021-42386, CVE-2021-42383, CVE-2019-5747, CVE-2021-42381, CVE-2019-5138, CVE-2017-3209, CVE-2011-5325, CVE-2023-39810, CVE-2018-1000500, CVE-2014-9645, CVE-2023-42365, CVE-2021-42380, CVE-2016-6301, CVE-2006-1058

Trust: 3.5

Fetched: Jan. 14, 2024, 9:50 a.m., Published: Jan. 10, 2024, 4:12 p.m.
Vulnerabilities: password guessing
Affected productsExternal IDs
vendor: palo alto networks model: networks
vendor: palo model: networks

Trust: 3.5

Fetched: Jan. 14, 2024, 9:44 a.m., Published: Oct. 19, 2023, 11:36 a.m.
Vulnerabilities: sql injection, injection attack
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202104-0768

Trust: 5.75

Fetched: Jan. 14, 2024, 9:43 a.m., Published: Aug. 8, 2021, 5 p.m.
Vulnerabilities: path traversal
Affected productsExternal IDs
vendor: cisco model: router
vendor: cisco model: routers
vendor: netgear model: router
vendor: d-link model: router
vendor: asus model: router
vendor: asus model: routers
vendor: asus model: asus
vendor: tenda model: router
vendor: buffalo model: router
vendor: buffalo model: wsr-2533dhp3
vendor: buffalo model: buffalo wsr-2533dhpl2
vendor: buffalo model: wsr-2533dhpl2
db: NVD ids: CVE-2021-20090, CVE-2021-27562, CVE-2021-27561
Related entries in the VARIoT vulnerabilities database: VAR-202103-0773

Trust: 3.5

Fetched: Jan. 14, 2024, 9:37 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
vendor: cisco model: router
vendor: cisco model: ios xe software
db: NVD ids: CVE-2023-20198, CVE-2021-1435
Related entries in the VARIoT vulnerabilities database: VAR-202008-0805, VAR-201804-1021, VAR-202204-0751, VAR-201501-0220, VAR-201403-0212, VAR-201312-0249, VAR-201711-0371, VAR-201305-0162, VAR-201305-0163, VAR-201502-0121, VAR-201801-1054, VAR-202011-0732, VAR-201310-0512, VAR-202011-1340, VAR-202101-1033, VAR-201508-0505, VAR-201810-0633, VAR-201609-0383, VAR-201301-0347, VAR-201609-0389, VAR-201401-0154, VAR-201607-0429, VAR-202101-1016, VAR-202011-1021, VAR-202006-1141, VAR-201810-0592, VAR-201204-0214, VAR-202011-1019, VAR-201312-0257, VAR-201501-0333, VAR-201301-0349, VAR-201810-0311, VAR-201306-0170, VAR-201608-0246, VAR-201102-0307, VAR-202006-1155, VAR-201908-0540, VAR-201906-0294, VAR-201810-0601, VAR-201401-0354, VAR-201501-0334, VAR-201501-0331, VAR-202007-1025, VAR-202003-1183, VAR-201312-0253, VAR-201312-0250, VAR-201301-0348, VAR-201905-0508, VAR-202006-1133, VAR-201810-0591, VAR-201901-0363, VAR-201302-0169, VAR-202001-0502, VAR-202106-0914, VAR-201805-0522, VAR-201702-0790, VAR-202011-1339, VAR-201312-0258, VAR-201102-0308, VAR-201710-0660, VAR-202106-0912, VAR-202006-1142, VAR-201810-0606, VAR-201911-1322, VAR-202102-0473, VAR-201711-0381, VAR-201711-0377, VAR-201801-1061, VAR-202008-0799, VAR-201604-0545, VAR-201605-0386, VAR-201901-0353, VAR-202004-1243, VAR-201405-0478, VAR-201312-0261, VAR-201505-0100, VAR-201711-0383, VAR-201604-0564, VAR-201909-0658, VAR-201502-0126, VAR-201309-0034, VAR-200912-0440, VAR-201507-0510, VAR-201908-1961, VAR-202111-0402, VAR-201701-0720, VAR-201708-1338, VAR-201506-0297, VAR-201806-1039, VAR-201804-0660, VAR-201305-0014, VAR-201908-0547, VAR-202006-1135, VAR-201902-0455, VAR-201707-0956, VAR-202301-1033, VAR-201312-0260, VAR-201206-0111, VAR-201307-0210, VAR-201312-0284, VAR-201810-0588, VAR-201607-0427, VAR-201506-0300, VAR-201710-0661, VAR-201905-0536, VAR-201801-1060, VAR-201810-0586, VAR-201408-0163, VAR-201609-0390, VAR-201407-0375, VAR-202102-0548, VAR-202111-0400, VAR-202009-1115, VAR-201901-0364, VAR-201701-0723, VAR-201901-0362, VAR-201711-0358, VAR-201312-0255, VAR-201210-0316, VAR-201810-0627, VAR-202011-1235, VAR-201805-0523, VAR-202104-0892, VAR-202010-1022, VAR-201901-0593, VAR-201705-3670, VAR-201711-0360, VAR-202209-0491, VAR-201908-0541, VAR-201407-0366, VAR-201607-0430, VAR-200912-0438, VAR-202004-0682, VAR-201506-0296, VAR-201312-0259, VAR-202106-0903, VAR-202009-1153, VAR-202003-1180, VAR-200912-0441, VAR-200912-0443, VAR-201810-0589, VAR-201406-0310, VAR-201703-0714, VAR-201902-0448, VAR-201801-1055, VAR-201810-0631, VAR-201901-0352, VAR-201507-0506, VAR-201204-0213, VAR-201703-0891, VAR-201102-0052, VAR-201711-0382, VAR-201405-0480, VAR-201312-0251, VAR-202106-0901, VAR-201506-0298, VAR-201312-0458, VAR-202006-1111, VAR-201711-0374, VAR-201807-0432, VAR-201801-1062, VAR-202110-0582, VAR-201110-0222, VAR-201701-0725, VAR-201410-0061, VAR-201908-0542, VAR-201102-0309, VAR-201204-0212, VAR-201710-0080, VAR-201409-0064, VAR-201407-0367, VAR-202204-1470, VAR-202101-1034, VAR-201501-0336, VAR-201102-0310, VAR-202003-1181, VAR-201406-0304, VAR-202003-1185, VAR-201807-0427, VAR-201810-0632, VAR-201309-0032, VAR-201805-0499, VAR-202106-0900, VAR-201501-0332, VAR-201607-0431, VAR-201312-0457, VAR-201102-0053, VAR-201711-0379, VAR-201312-0252, VAR-201711-0380, VAR-201701-0722, VAR-201502-0125, VAR-201810-0587, VAR-201506-0295, VAR-201206-0109, VAR-202008-0832, VAR-201810-0590, VAR-201502-0127, VAR-201110-0449, VAR-201407-0368, VAR-201206-0110, VAR-201806-1040, VAR-201309-0031, VAR-201406-0312, VAR-201810-0629, VAR-201305-0117, VAR-201306-0137, VAR-202008-0833, VAR-201312-0459, VAR-201908-1009, VAR-201312-0248, VAR-201501-0223, VAR-202008-0817, VAR-201405-0474, VAR-202106-0915, VAR-201905-0509, VAR-201501-0337, VAR-201810-0630, VAR-201407-0374, VAR-201701-0721, VAR-201710-0636, VAR-202106-0916, VAR-201312-0254, VAR-202111-0401, VAR-202011-1012, VAR-201408-0152, VAR-200912-0439, VAR-201706-0585, VAR-201210-0317, VAR-201206-0108, VAR-201810-0625, VAR-201609-0381, VAR-201305-0118, VAR-201301-0152, VAR-201902-0458, VAR-201908-0854, VAR-202004-1237, VAR-202008-0820, VAR-201902-0445, VAR-201810-0628, VAR-201405-0481, VAR-201405-0479, VAR-202011-1013, VAR-202208-0240, VAR-201807-0431, VAR-202102-0578, VAR-201711-0376, VAR-201711-0370, VAR-201404-0564, VAR-201807-0426, VAR-201312-0256, VAR-201210-0318, VAR-201711-0359, VAR-201309-0035, VAR-201901-0358, VAR-202208-0238, VAR-201607-0428, VAR-201503-0171, VAR-202006-1134, VAR-201210-0313, VAR-201901-0354, VAR-201911-1776, VAR-201710-0662, VAR-202104-0452, VAR-201210-0314, VAR-200808-0182, VAR-201501-0335, VAR-201308-0092, VAR-201810-0331, VAR-201801-1059, VAR-201506-0252, VAR-201309-0033, VAR-201210-0315, VAR-201602-0050, VAR-202106-0911, VAR-202008-0798, VAR-202009-1173, VAR-200912-0442, VAR-201810-0624, VAR-201405-0477, VAR-201711-0378, VAR-201908-1010, VAR-201512-0417, VAR-201810-0300, VAR-201206-0112, VAR-201407-0369, VAR-202001-1197

Trust: 5.25

Fetched: Jan. 14, 2024, 9:32 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, improper validation, sql injection...
Affected productsExternal IDs
vendor: cisco model: cisco spark
vendor: cisco model: cisco webex meetings server
vendor: cisco model: webex training center
vendor: cisco model: webex meetings server
vendor: cisco model: webex meetings desktop
vendor: cisco model: rv345p
vendor: cisco model: webex meeting manager
vendor: cisco model: webex social
vendor: cisco model: webex meeting server
vendor: cisco model: cisco webex meetings desktop
vendor: cisco model: cisco webex social
vendor: cisco model: download manager
vendor: cisco model: webex teams
vendor: cisco model: cisco webex business suite
vendor: cisco model: cisco webex sales center
vendor: cisco model: asr 1000
vendor: cisco model: cisco webex meetings online
vendor: cisco model: rv340
vendor: cisco model: webex player
vendor: cisco model: cisco intelligent proximity
vendor: cisco model: webex meetings online
vendor: cisco model: cisco webex meetmenow
vendor: cisco model: webex sales center
vendor: cisco model: webex extension
vendor: cisco model: routers
vendor: cisco model: webex meetings desktop app
vendor: cisco model: webex meetings
vendor: cisco model: webex meetings player t29
vendor: cisco model: webex video mesh
vendor: cisco model: intelligent proximity
vendor: cisco model: webex
vendor: cisco model: link layer discovery protocol
vendor: cisco model: webex productivity tools
vendor: cisco model: meeting
vendor: cisco model: rv345
vendor: cisco model: cisco webex extension
vendor: cisco model: webex business suite
vendor: cisco model: gpccontainer class activex control
vendor: cisco model: cisco webex teams
vendor: cisco model: series
vendor: cisco model: meetings server
vendor: cisco model: cisco webex meeting center
vendor: cisco model: cisco webex connect im
vendor: cisco model: asr 1000 series
vendor: cisco model: cisco webex meeting manager
vendor: cisco model: webex meetings client
vendor: cisco model: webex meeting center
vendor: cisco model: cisco webex network recording player
vendor: cisco model: cisco quad
vendor: cisco model: cisco webex training center
vendor: cisco model: activetouch general plugin container
vendor: cisco model: meeting server
vendor: cisco model: webex meetings player t29.10
vendor: cisco model: webex support center
vendor: cisco model: cisco webex meetings
vendor: cisco model: webex meetmenow
vendor: cisco model: webex event center
vendor: cisco model: cisco webex
vendor: cisco model: spark
vendor: cisco model: webex network recording player
vendor: cisco model: cisco webex support center
vendor: cisco model: webex arf players
vendor: cisco model: gpccontainer class
vendor: cisco model: webex connect im
vendor: cisco model: webex meetings server 2.6
vendor: cisco model: webex meetings server 2.7
vendor: cisco model: cisco webex event center
vendor: cisco model: rv345p dual wan gigabit vpn routers
vendor: cisco model: webex meetings suite
vendor: cisco model: quad
vendor: cisco model: cisco webex productivity tools
vendor: cisco model: webex meetings server 2.5
vendor: mesh model: mesh
vendor: google model: android
vendor: google model: google chrome
vendor: google model: chrome
db: NVD ids: CVE-2020-3440, CVE-2018-0276, CVE-2022-20763, CVE-2015-0583, CVE-2014-0708, CVE-2013-6960, CVE-2017-12360, CVE-2013-1231, CVE-2013-1232, CVE-2015-0589, CVE-2018-0103, CVE-2020-27126, CVE-2013-5529, CVE-2020-3604, CVE-2021-1310, CVE-2015-4297, CVE-2018-15416, CVE-2016-1464, CVE-2013-1108, CVE-2016-1482, CVE-2013-6687, CVE-2016-1448, CVE-2021-1242, CVE-2020-3573, CVE-2020-3342, CVE-2018-15422, CVE-2012-1337, CVE-2020-3471, CVE-2013-6968, CVE-2014-8032, CVE-2013-1110, CVE-2018-0436, CVE-2020-7796, CVE-2013-3392, CVE-2016-1484, CVE-2010-3041, CVE-2020-3361, CVE-2019-1926, CVE-2019-1868, CVE-2018-15431, CVE-2014-0682, CVE-2014-8033, CVE-2014-8030, CVE-2020-3345, CVE-2020-3155, CVE-2013-6964, CVE-2013-6961, CVE-2013-1109, CVE-2019-1771, CVE-2020-3319, CVE-2018-15421, CVE-2019-1637, CVE-2013-1107, CVE-2019-16001, CVE-2019-16005, CVE-2021-1525, CVE-2018-0287, CVE-2017-3823, CVE-2020-3603, CVE-2013-6969, CVE-2010-3042, CVE-2017-12293, CVE-2023-20180, CVE-2021-1517, CVE-2020-3347, CVE-2018-15436, CVE-2019-15987, CVE-2019-15287, CVE-2021-1221, CVE-2017-12370, CVE-2017-12366, CVE-2018-0110, CVE-2020-3413, CVE-2016-4349, CVE-2023-20104, CVE-2016-1410, CVE-2019-1640, CVE-2020-3194, CVE-2014-2133, CVE-2013-6972, CVE-2015-0634, CVE-2017-12372, CVE-2016-1389, CVE-2019-1939, CVE-2015-0596, CVE-2013-1118, CVE-2009-2875, CVE-2015-4281, CVE-2019-1954, CVE-2021-1500, CVE-2017-3794, CVE-2017-6784, CVE-2015-4209, CVE-2018-0356, CVE-2018-0112, CVE-2012-6399, CVE-2019-1929, CVE-2020-3322, CVE-2019-1689, CVE-2017-6753, CVE-2023-20047, CVE-2013-6971, CVE-2012-3056, CVE-2013-3425, CVE-2013-6973, CVE-2018-15418, CVE-2016-1446, CVE-2006-3424, CVE-2015-4212, CVE-2017-12296, CVE-2019-1773, CVE-2018-0109, CVE-2018-15442, CVE-2014-3340, CVE-2016-1483, CVE-2014-3311, CVE-2021-1372, CVE-2021-40128, CVE-2020-3116, CVE-2019-1638, CVE-2017-3797, CVE-2019-1636, CVE-2017-12294, CVE-2013-6966, CVE-2012-3939, CVE-2018-15410, CVE-2020-3588, CVE-2018-0288, CVE-2021-1467, CVE-2020-3535, CVE-2018-15461, CVE-2017-6651, CVE-2017-12297, CVE-2022-20863, CVE-2019-1927, CVE-2014-3301, CVE-2016-1449, CVE-2009-2879, CVE-2019-1866, CVE-2015-4208, CVE-2013-6970, CVE-2021-1536, CVE-2020-3541, CVE-2020-3127, CVE-2009-2876, CVE-2009-2878, CVE-2018-15419, CVE-2014-3294, CVE-2017-3811, CVE-2019-1680, CVE-2018-0104, CVE-2018-15414, CVE-2019-1639, CVE-2015-4276, CVE-2012-1336, CVE-2017-3880, CVE-2010-3269, CVE-2017-12371, CVE-2014-2135, CVE-2013-6962, CVE-2021-1503, CVE-2020-3131, CVE-2015-4210, CVE-2019-15286, CVE-2013-6710, CVE-2020-3263, CVE-2019-15285, CVE-2017-12363, CVE-2018-0390, CVE-2018-0111, CVE-2021-34743, CVE-2011-4004, CVE-2017-3799, CVE-2014-3400, CVE-2019-1928, CVE-2010-3043, CVE-2012-1335, CVE-2014-0691, CVE-2014-3395, CVE-2014-3303, CVE-2022-20778, CVE-2021-1311, CVE-2023-20132, CVE-2006-3423, CVE-2014-8035, CVE-2010-3044, CVE-2020-3128, CVE-2014-3286, CVE-2020-3182, CVE-2018-0380, CVE-2018-15415, CVE-2013-1116, CVE-2018-0264, CVE-2021-1502, CVE-2014-8031, CVE-2007-6005, CVE-2016-1450, CVE-2013-6709, CVE-2010-3270, CVE-2017-12368, CVE-2013-6963, CVE-2017-12369, CVE-2017-3796, CVE-2015-0595, CVE-2018-15417, CVE-2015-4207, CVE-2012-3054, CVE-2020-3501, CVE-2018-15420, CVE-2015-0597, CVE-2011-3319, CVE-2014-3304, CVE-2012-3055, CVE-2018-0357, CVE-2013-1115, CVE-2014-3296, CVE-2018-15412, CVE-2013-1244, CVE-2013-1205, CVE-2020-3502, CVE-2013-6711, CVE-2019-1924, CVE-2013-6959, CVE-2015-0590, CVE-2020-3463, CVE-2014-2199, CVE-2021-1526, CVE-2019-1772, CVE-2014-8036, CVE-2018-15413, CVE-2014-3310, CVE-2017-3795, CVE-2017-12257, CVE-2021-1527, CVE-2013-6965, CVE-2021-40115, CVE-2020-3419, CVE-2014-3302, CVE-2009-2880, CVE-2017-6669, CVE-2012-3940, CVE-2012-3053, CVE-2018-15409, CVE-2016-1415, CVE-2013-1245, CVE-2012-6397, CVE-2019-1674, CVE-2019-1948, CVE-2019-16307, CVE-2019-15283, CVE-2020-3126, CVE-2020-3472, CVE-2019-1677, CVE-2018-15411, CVE-2014-2136, CVE-2014-2134, CVE-2020-3441, CVE-2022-20820, CVE-2023-20133, CVE-2018-0387, CVE-2021-1351, CVE-2017-12365, CVE-2017-12359, CVE-2014-2186, CVE-2018-0379, CVE-2013-6967, CVE-2012-3941, CVE-2023-20134, CVE-2017-12295, CVE-2013-1119, CVE-2019-1655, CVE-2022-20852, CVE-2016-1447, CVE-2015-0668, CVE-2020-3321, CVE-2012-3936, CVE-2019-1641, CVE-2019-15960, CVE-2017-12298, CVE-2021-1420, CVE-2012-3937, CVE-2008-3558, CVE-2014-8034, CVE-2013-3448, CVE-2019-15284, CVE-2018-0457, CVE-2018-0108, CVE-2015-4194, CVE-2013-1117, CVE-2012-3938, CVE-2016-1309, CVE-2021-1544, CVE-2020-3412, CVE-2020-3542, CVE-2009-2877, CVE-2018-15408, CVE-2014-2132, CVE-2017-12367, CVE-2019-1925, CVE-2015-6384, CVE-2018-0422, CVE-2012-3057, CVE-2014-3305, CVE-2020-3142

Trust: 5.75

Fetched: Jan. 14, 2024, 9:26 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: authentication bypass
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: routers
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
db: NVD ids: CVE-2023-20198