VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-201512-0402, VAR-202304-0151, VAR-201710-0659, VAR-201504-0294, VAR-201501-0247, VAR-201810-0344, VAR-202010-0386, VAR-201810-0582, VAR-201908-0046, VAR-201808-0119, VAR-200512-0678, VAR-202205-1787, VAR-201508-0392, VAR-201404-0168, VAR-200909-0385, VAR-200609-0071, VAR-200505-0128, VAR-202312-0198, VAR-201310-0484, VAR-201709-0004, VAR-200511-0061, VAR-200206-0066, VAR-201507-0089, VAR-202211-1910, VAR-202002-0611, VAR-200305-0024, VAR-201406-0313, VAR-200603-0272, VAR-201411-0131, VAR-200511-0015, VAR-201101-0306, VAR-201804-0203, VAR-201310-0534, VAR-200511-0112, VAR-201311-0291, VAR-201905-1319, VAR-201101-0330, VAR-200106-0093, VAR-200407-0043, VAR-200210-0273, VAR-202106-0146, VAR-201205-0331, VAR-200511-0016, VAR-202003-1187, VAR-202204-1420, VAR-200506-0141, VAR-201011-0069, VAR-201006-0026, VAR-201804-1019, VAR-201309-0394, VAR-201002-0164, VAR-201311-0232, VAR-201707-0436, VAR-200905-0155, VAR-202006-1087, VAR-201605-0554, VAR-201309-0039, VAR-202107-0092, VAR-201702-0117, VAR-201208-0125, VAR-200210-0245, VAR-200711-0141, VAR-200905-0196, VAR-200211-0071, VAR-201209-0394, VAR-200401-0045, VAR-202002-0581, VAR-201505-0238, VAR-201611-0173, VAR-200505-0908, VAR-201105-0256, VAR-201704-1346, VAR-201808-0121, VAR-201804-0218, VAR-201609-0597, VAR-202205-0133, VAR-201702-1059, VAR-201808-0120, VAR-201404-0031, VAR-200511-0110, VAR-201705-3726, VAR-201804-0510, VAR-201305-0115, VAR-202007-0194, VAR-200704-0585, VAR-200511-0111, VAR-201608-0272, VAR-202204-1973, VAR-201209-0366, VAR-201003-0231, VAR-201508-0132, VAR-202204-0921, VAR-201610-0225, VAR-201208-0707, VAR-201208-0126, VAR-202209-0516, VAR-201912-0092, VAR-202002-0612, VAR-200801-0305, VAR-202010-1490, VAR-201808-0956, VAR-202201-1944, VAR-200809-0316, VAR-202007-0193, VAR-201506-0163, VAR-202002-0610, VAR-201904-0204, VAR-201506-0188, VAR-202109-0790

Trust: 5.25

Fetched: Jan. 14, 2024, 9:52 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: kernel panic, code execution, improper validation...
Affected productsExternal IDs
vendor: cisco model: rv130w
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: 5500 series adaptive security appliance
vendor: cisco model: pix firewall
vendor: cisco model: cisco asa 5500 series
vendor: cisco model: nexus
vendor: cisco model: vpn 3000 series
vendor: cisco model: routers
vendor: cisco model: cisco unified callmanager
vendor: cisco model: series switches
vendor: cisco model: rv130
vendor: cisco model: series
vendor: cisco model: ios xe
vendor: cisco model: clamav
vendor: cisco model: series switch
vendor: cisco model: adaptive security virtual appliance
vendor: cisco model: staros
vendor: cisco model: cisco pix 500 series security appliance
vendor: cisco model: ios xr
vendor: cisco model: asa 5500 series
vendor: cisco model: rv215w
vendor: cisco model: 1000v
vendor: cisco model: catalyst 6500
vendor: cisco model: asa 1000v cloud firewall
vendor: cisco model: series routers
vendor: cisco model: rv110w
vendor: cisco model: asr 5000
vendor: cisco model: vpn client
vendor: cisco model: cisco small business
vendor: cisco model: 7600 series
vendor: cisco model: unified presence
vendor: cisco model: series integrated services routers
vendor: cisco model: cisco nx-os
vendor: cisco model: cisco staros
vendor: cisco model: vpn 3002 hardware client
vendor: cisco model: cisco 7600 series
vendor: cisco model: isr g2 routers
vendor: cisco model: ios xr software
vendor: cisco model: ios xe software
vendor: cisco model: unified presence server
vendor: cisco model: packet data network gateway
vendor: cisco model: 4321
vendor: cisco model: firepower
vendor: cisco model: cisco anyconnect secure mobility client
vendor: cisco model: vpn 3000 concentrator
vendor: cisco model: soho
vendor: cisco model: cisco unified presence server
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: cisco virtualized packet core
vendor: cisco model: netscaler gateway
vendor: cisco model: catalyst 6500 series
vendor: cisco model: catalyst
vendor: cisco model: catalyst 9800
vendor: cisco model: pix 500
vendor: cisco model: pix 500 series security appliance
vendor: cisco model: cisco catalyst 6500 series
vendor: cisco model: firepower 2100
vendor: cisco model: integrated services routers
vendor: cisco model: cisco unified presence
vendor: cisco model: virtualized packet core
vendor: cisco model: ios xe 3.15
vendor: cisco model: technical support
vendor: cisco model: firepower 9300
vendor: cisco model: asa software
vendor: cisco model: ios 12.2
vendor: cisco model: industrial security appliance
vendor: cisco model: firepower threat defense
vendor: cisco model: router
vendor: cisco model: cisco asa 1000v cloud firewall
vendor: cisco model: ios software
vendor: cisco model: cisco vpn 3000 series
vendor: cisco model: adaptive security appliance
vendor: cisco model: small business
vendor: cisco model: isr g2
vendor: cisco model: cisco pix firewall
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: aggregation services router
vendor: cisco model: unified callmanager
vendor: cisco model: cisco ios xr
vendor: cisco model: nx-os
vendor: cisco model: asa 5500
vendor: cisco model: mds 9000
vendor: rockwell model: factorytalk
vendor: rockwell model: factorytalk view se
vendor: rockwell model: factorytalk view
vendor: nortel model: contivity
vendor: cups model: cups
vendor: clavister model: security gateway
vendor: clavister model: firewall
vendor: ingate model: siparator
vendor: ingate model: ingate firewall
vendor: ingate model: firewall
vendor: zyxel model: zywall
vendor: clamav model: clamav
vendor: apple model: apple mac os x
vendor: apple model: cups
vendor: apple model: mac os x
vendor: apple model: mac os
vendor: seil model: b1 firmware
vendor: seil model: seil/b1
vendor: seil model: seil/x2
vendor: seil model: seil/neu 2fe plus
vendor: seil model: neu 2fe plus
vendor: seil model: seil/turbo
vendor: seil model: seil/x86
vendor: seil model: turbo
vendor: seil model: seil/x1
vendor: innominate model: mguard
vendor: cisco systems model: rv130w
vendor: cisco systems model: anyconnect secure mobility client
vendor: cisco systems model: 5500 series adaptive security appliance
vendor: cisco systems model: pix firewall
vendor: cisco systems model: cisco asa 5500 series
vendor: cisco systems model: nexus
vendor: cisco systems model: vpn 3000 series
vendor: cisco systems model: routers
vendor: cisco systems model: cisco unified callmanager
vendor: cisco systems model: series switches
vendor: cisco systems model: rv130
vendor: cisco systems model: series
vendor: cisco systems model: ios xe
vendor: cisco systems model: clamav
vendor: cisco systems model: series switch
vendor: cisco systems model: adaptive security virtual appliance
vendor: cisco systems model: staros
vendor: cisco systems model: cisco pix 500 series security appliance
vendor: cisco systems model: ios xr
vendor: cisco systems model: asa 5500 series
vendor: cisco systems model: rv215w
vendor: cisco systems model: 1000v
vendor: cisco systems model: catalyst 6500
vendor: cisco systems model: asa 1000v cloud firewall
vendor: cisco systems model: series routers
vendor: cisco systems model: rv110w
vendor: cisco systems model: asr 5000
vendor: cisco systems model: vpn client
vendor: cisco systems model: cisco small business
vendor: cisco systems model: 7600 series
vendor: cisco systems model: unified presence
vendor: cisco systems model: series integrated services routers
vendor: cisco systems model: cisco nx-os
vendor: cisco systems model: cisco staros
vendor: cisco systems model: vpn 3002 hardware client
vendor: cisco systems model: cisco 7600 series
vendor: cisco systems model: isr g2 routers
vendor: cisco systems model: ios xr software
vendor: cisco systems model: ios xe software
vendor: cisco systems model: unified presence server
vendor: cisco systems model: packet data network gateway
vendor: cisco systems model: 4321
vendor: cisco systems model: firepower
vendor: cisco systems model: cisco anyconnect secure mobility client
vendor: cisco systems model: vpn 3000 concentrator
vendor: cisco systems model: soho
vendor: cisco systems model: cisco unified presence server
vendor: cisco systems model: cisco ios xe
vendor: cisco systems model: cisco ios
vendor: cisco systems model: cisco virtualized packet core
vendor: cisco systems model: netscaler gateway
vendor: cisco systems model: catalyst 6500 series
vendor: cisco systems model: catalyst
vendor: cisco systems model: catalyst 9800
vendor: cisco systems model: pix 500
vendor: cisco systems model: pix 500 series security appliance
vendor: cisco systems model: cisco catalyst 6500 series
vendor: cisco systems model: firepower 2100
vendor: cisco systems model: integrated services routers
vendor: cisco systems model: cisco unified presence
vendor: cisco systems model: virtualized packet core
vendor: cisco systems model: ios xe 3.15
vendor: cisco systems model: technical support
vendor: cisco systems model: firepower 9300
vendor: cisco systems model: asa software
vendor: cisco systems model: ios 12.2
vendor: cisco systems model: industrial security appliance
vendor: cisco systems model: firepower threat defense
vendor: cisco systems model: router
vendor: cisco systems model: cisco asa 1000v cloud firewall
vendor: cisco systems model: ios software
vendor: cisco systems model: cisco vpn 3000 series
vendor: cisco systems model: adaptive security appliance
vendor: cisco systems model: small business
vendor: cisco systems model: isr g2
vendor: cisco systems model: cisco pix firewall
vendor: cisco systems model: cisco adaptive security appliance
vendor: cisco systems model: aggregation services router
vendor: cisco systems model: unified callmanager
vendor: cisco systems model: cisco ios xr
vendor: cisco systems model: nx-os
vendor: cisco systems model: asa 5500
vendor: cisco systems model: mds 9000
vendor: novell model: client
vendor: novell model: bordermanager
vendor: mikrotik model: routers
vendor: mikrotik model: routeros
vendor: mikrotik model: router
vendor: forcepoint model: ngfw security management center
vendor: forcepoint model: next generation firewall
vendor: huawei model: secospace usg6600
vendor: huawei model: usg2205bsr
vendor: huawei model: huawei
vendor: huawei model: usg2220bsr
vendor: huawei model: ngfw
vendor: huawei model: usg9500
vendor: huawei model: nip6800
vendor: huawei model: nova
vendor: huawei model: usg5120bsr
vendor: huawei model: usg5150bsr
vendor: fortigate model: fortios
vendor: sonicwall model: switch
vendor: sonicwall model: soho
vendor: sonicwall model: ssl vpn
vendor: sonicwall model: remote access
vendor: wireshark model: wireshark
vendor: phoenix contact model: mguard
vendor: citrix model: netscaler gateway
vendor: citrix model: application delivery controller
vendor: citrix model: gateway
vendor: citrix model: netscaler
vendor: citrix model: netscaler application delivery controller
vendor: brocade model: brocade netiron os
vendor: brocade model: netiron os
vendor: netbsd model: current
vendor: netbsd model: netbsd
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: factorytalk view se
vendor: rockwell automation model: factorytalk view
vendor: check point model: next generation
vendor: check point model: check point
vendor: check point model: security gateway
vendor: sophos model: mobile
vendor: sophos model: firewall
vendor: sophos model: sophos utm
db: NVD ids: CVE-2015-6429, CVE-2004-0819, CVE-2012-5379, CVE-2012-5382, CVE-2011-2147, CVE-2023-20051, CVE-2017-12289, CVE-2023-28842, CVE-2023-20193, CVE-2015-0675, CVE-2014-6385, CVE-2007-2524, CVE-2018-0472, CVE-2020-1657, CVE-2006-4436, CVE-2018-15397, CVE-2019-6143, CVE-2023-38710, CVE-2017-17305, CVE-2006-4018, CVE-2005-4570, CVE-2015-3204, CVE-2006-5201, CVE-2022-0910, CVE-2015-3966, CVE-2014-0612, CVE-2009-2868, CVE-2006-4613, CVE-2005-1802, CVE-2006-5286, CVE-2023-49692, CVE-2013-5172, CVE-2023-41085, CVE-2011-1784, CVE-2019-0060, CVE-2006-1268, CVE-2011-4667, CVE-2005-3732, CVE-2002-0603, CVE-2004-2230, CVE-2022-22201, CVE-2015-5080, CVE-2022-23746, CVE-2020-1829, CVE-2010-0392, CVE-2005-4321, CVE-2003-0258, CVE-2008-2246, CVE-2018-8753, CVE-2014-3299, CVE-2006-0383, CVE-2022-0286, CVE-2014-8952, CVE-2012-5383, CVE-2012-5378, CVE-2005-3669, CVE-2010-4692, CVE-2016-10455, CVE-2013-5507, CVE-2023-28841, CVE-2005-3668, CVE-2000-0962, CVE-2012-5381, CVE-2013-5548, CVE-2013-0406, CVE-2019-1706, CVE-2010-4676, CVE-2001-0376, CVE-2004-0710, CVE-2005-3753, CVE-2018-6916, CVE-2002-1102, CVE-2020-11176, CVE-2020-1749, CVE-2011-4231, CVE-2006-0905, CVE-2005-3670, CVE-2020-3190, CVE-2023-4398, CVE-2023-1707, CVE-2022-20679, CVE-2005-2025, CVE-2010-4354, CVE-2009-4922, CVE-2018-0273, CVE-2004-0219, CVE-2001-0284, CVE-2022-3625, CVE-2013-4709, CVE-2003-0242, CVE-1999-0727, CVE-2004-2678, CVE-2010-0567, CVE-2008-4190, CVE-2013-6694, CVE-2009-0346, CVE-2012-5380, CVE-2008-1205, CVE-2019-5613, CVE-2018-17977, CVE-2017-3865, CVE-2009-2918, CVE-2007-3157, CVE-2002-0414, CVE-2009-1632, CVE-2020-3220, CVE-2016-1379, CVE-2009-3675, CVE-2005-0398, CVE-2020-12142, CVE-2022-27666, CVE-2020-10769, CVE-2013-1028, CVE-2020-20262, CVE-2022-3635, CVE-2016-8492, CVE-2012-2499, CVE-2019-18934, CVE-2002-1092, CVE-2007-6094, CVE-2023-28840, CVE-2009-1574, CVE-2002-0666, CVE-2012-3915, CVE-2003-1004, CVE-2018-25062, CVE-2008-1198, CVE-2020-1816, CVE-2015-4047, CVE-2017-17023, CVE-2013-3876, CVE-2016-6466, CVE-2006-4331, CVE-2005-0039, CVE-2023-47091, CVE-2011-1547, CVE-2022-3630, CVE-2017-6609, CVE-2017-17312, CVE-2016-10448, CVE-2008-1335, CVE-2013-2237, CVE-2016-2183, CVE-2022-29473, CVE-2017-6297, CVE-2017-17311, CVE-2021-34579, CVE-2012-5032, CVE-2007-3248, CVE-2004-0164, CVE-2005-3666, CVE-2017-8338, CVE-2016-10396, CVE-2006-0718, CVE-2009-0790, CVE-2018-9511, CVE-2017-6156, CVE-2013-1241, CVE-2020-12028, CVE-2007-1826, CVE-2005-3667, CVE-2016-5736, CVE-2015-6111, CVE-2012-5377, CVE-2022-20742, CVE-2005-4090, CVE-2022-3545, CVE-2021-28508, CVE-2012-3727, CVE-2010-0578, CVE-2021-1422, CVE-2008-3652, CVE-2015-6510, CVE-2007-6282, CVE-2022-27270, CVE-2013-4350, CVE-2018-0753, CVE-2016-8203, CVE-2012-1370, CVE-2009-0304, CVE-2020-25645, CVE-2013-2234, CVE-2008-3651, CVE-2023-22413, CVE-2012-2500, CVE-2022-20923, CVE-2018-6918, CVE-2019-6147, CVE-2020-1830, CVE-2008-0324, CVE-2020-5938, CVE-2018-9129, CVE-2022-23024, CVE-2008-2733, CVE-2020-12027, CVE-2023-22417, CVE-2015-0771, CVE-2020-1828, CVE-2007-1841, CVE-2019-8456, CVE-2022-3624, CVE-2005-2359, CVE-2015-4550, CVE-2021-23039

Trust: 5.5

Fetched: Jan. 14, 2024, 9:51 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: information leak, denial of service, directory traversal...
Affected productsExternal IDs
vendor: cisco model: d9800 network transport receiver
vendor: cisco model: d9800
vendor: cisco model: 1100
vendor: dbpower model: u818a wifi
vendor: dbpower model: u818a
vendor: vivotek model: vivotek fd8136
vendor: vivotek model: fd8136
vendor: d-link model: dcs-1130
vendor: d-link model: dsr-250n
vendor: d-link model: dcs-1100
vendor: jantek model: jtc-200
vendor: moxa model: awk-3131a
vendor: moxa model: moxa awk-3131a
vendor: moxa model: awk-3131a firmware
vendor: raritan model: dominion
vendor: telestar model: imperial i500-bt
vendor: telestar model: imperial i150
vendor: telestar model: bobs rock radio
vendor: telestar model: dabman d10
vendor: telestar model: imperial i600
vendor: telestar model: imperial i110
vendor: telestar model: imperial i450
vendor: telestar model: dabman i30 stereo
vendor: telestar model: imperial i200-cd
vendor: telestar model: imperial i200
vendor: telestar model: imperial i400
vendor: honeywell model: intermec pm23
vendor: hospira model: lifecare pca infusion system
vendor: arris model: nvg599
vendor: arris model: nvg589
db: NVD ids: CVE-2023-42363, CVE-2017-8415, CVE-2017-15874, CVE-2017-14115, CVE-2015-3459, CVE-2021-42376, CVE-2018-20679, CVE-2012-6614, CVE-2022-30065, CVE-2022-28391, CVE-2021-42378, CVE-2021-33530, CVE-2005-2136, CVE-2018-14494, CVE-2017-15873, CVE-2021-42382, CVE-2015-9261, CVE-2016-2148, CVE-2021-42385, CVE-2016-5791, CVE-2017-16544, CVE-2021-42373, CVE-2018-1000517, CVE-2013-1813, CVE-2006-5050, CVE-2017-14116, CVE-2019-16734, CVE-2021-42384, CVE-2019-13473, CVE-2021-37555, CVE-2017-5671, CVE-2016-2147, CVE-2011-2716, CVE-2021-42377, CVE-2021-42379, CVE-2018-0099, CVE-2023-42364, CVE-2021-42374, CVE-2021-42375, CVE-2021-28831, CVE-2023-42366, CVE-2022-48174, CVE-2021-42386, CVE-2021-42383, CVE-2019-5747, CVE-2021-42381, CVE-2019-5138, CVE-2017-3209, CVE-2011-5325, CVE-2023-39810, CVE-2018-1000500, CVE-2014-9645, CVE-2023-42365, CVE-2021-42380, CVE-2016-6301, CVE-2006-1058

Trust: 3.5

Fetched: Jan. 14, 2024, 9:50 a.m., Published: Jan. 10, 2024, 4:12 p.m.
Vulnerabilities: password guessing
Affected productsExternal IDs
vendor: palo alto networks model: networks
vendor: palo model: networks

Trust: 3.5

Fetched: Jan. 14, 2024, 9:44 a.m., Published: Oct. 19, 2023, 11:36 a.m.
Vulnerabilities: sql injection, injection attack
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202104-0768

Trust: 5.75

Fetched: Jan. 14, 2024, 9:43 a.m., Published: Aug. 8, 2021, 5 p.m.
Vulnerabilities: path traversal
Affected productsExternal IDs
vendor: cisco model: router
vendor: cisco model: routers
vendor: netgear model: router
vendor: d-link model: router
vendor: asus model: router
vendor: asus model: routers
vendor: asus model: asus
vendor: tenda model: router
vendor: buffalo model: router
vendor: buffalo model: wsr-2533dhp3
vendor: buffalo model: buffalo wsr-2533dhpl2
vendor: buffalo model: wsr-2533dhpl2
db: NVD ids: CVE-2021-20090, CVE-2021-27562, CVE-2021-27561
Related entries in the VARIoT vulnerabilities database: VAR-202103-0773

Trust: 3.5

Fetched: Jan. 14, 2024, 9:37 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
vendor: cisco model: router
vendor: cisco model: ios xe software
db: NVD ids: CVE-2023-20198, CVE-2021-1435
Related entries in the VARIoT vulnerabilities database: VAR-202008-0805, VAR-201804-1021, VAR-202204-0751, VAR-201501-0220, VAR-201403-0212, VAR-201312-0249, VAR-201711-0371, VAR-201305-0162, VAR-201305-0163, VAR-201502-0121, VAR-201801-1054, VAR-202011-0732, VAR-201310-0512, VAR-202011-1340, VAR-202101-1033, VAR-201508-0505, VAR-201810-0633, VAR-201609-0383, VAR-201301-0347, VAR-201609-0389, VAR-201401-0154, VAR-201607-0429, VAR-202101-1016, VAR-202011-1021, VAR-202006-1141, VAR-201810-0592, VAR-201204-0214, VAR-202011-1019, VAR-201312-0257, VAR-201501-0333, VAR-201301-0349, VAR-201810-0311, VAR-201306-0170, VAR-201608-0246, VAR-201102-0307, VAR-202006-1155, VAR-201908-0540, VAR-201906-0294, VAR-201810-0601, VAR-201401-0354, VAR-201501-0334, VAR-201501-0331, VAR-202007-1025, VAR-202003-1183, VAR-201312-0253, VAR-201312-0250, VAR-201301-0348, VAR-201905-0508, VAR-202006-1133, VAR-201810-0591, VAR-201901-0363, VAR-201302-0169, VAR-202001-0502, VAR-202106-0914, VAR-201805-0522, VAR-201702-0790, VAR-202011-1339, VAR-201312-0258, VAR-201102-0308, VAR-201710-0660, VAR-202106-0912, VAR-202006-1142, VAR-201810-0606, VAR-201911-1322, VAR-202102-0473, VAR-201711-0381, VAR-201711-0377, VAR-201801-1061, VAR-202008-0799, VAR-201604-0545, VAR-201605-0386, VAR-201901-0353, VAR-202004-1243, VAR-201405-0478, VAR-201312-0261, VAR-201505-0100, VAR-201711-0383, VAR-201604-0564, VAR-201909-0658, VAR-201502-0126, VAR-201309-0034, VAR-200912-0440, VAR-201507-0510, VAR-201908-1961, VAR-202111-0402, VAR-201701-0720, VAR-201708-1338, VAR-201506-0297, VAR-201806-1039, VAR-201804-0660, VAR-201305-0014, VAR-201908-0547, VAR-202006-1135, VAR-201902-0455, VAR-201707-0956, VAR-202301-1033, VAR-201312-0260, VAR-201206-0111, VAR-201307-0210, VAR-201312-0284, VAR-201810-0588, VAR-201607-0427, VAR-201506-0300, VAR-201710-0661, VAR-201905-0536, VAR-201801-1060, VAR-201810-0586, VAR-201408-0163, VAR-201609-0390, VAR-201407-0375, VAR-202102-0548, VAR-202111-0400, VAR-202009-1115, VAR-201901-0364, VAR-201701-0723, VAR-201901-0362, VAR-201711-0358, VAR-201312-0255, VAR-201210-0316, VAR-201810-0627, VAR-202011-1235, VAR-201805-0523, VAR-202104-0892, VAR-202010-1022, VAR-201901-0593, VAR-201705-3670, VAR-201711-0360, VAR-202209-0491, VAR-201908-0541, VAR-201407-0366, VAR-201607-0430, VAR-200912-0438, VAR-202004-0682, VAR-201506-0296, VAR-201312-0259, VAR-202106-0903, VAR-202009-1153, VAR-202003-1180, VAR-200912-0441, VAR-200912-0443, VAR-201810-0589, VAR-201406-0310, VAR-201703-0714, VAR-201902-0448, VAR-201801-1055, VAR-201810-0631, VAR-201901-0352, VAR-201507-0506, VAR-201204-0213, VAR-201703-0891, VAR-201102-0052, VAR-201711-0382, VAR-201405-0480, VAR-201312-0251, VAR-202106-0901, VAR-201506-0298, VAR-201312-0458, VAR-202006-1111, VAR-201711-0374, VAR-201807-0432, VAR-201801-1062, VAR-202110-0582, VAR-201110-0222, VAR-201701-0725, VAR-201410-0061, VAR-201908-0542, VAR-201102-0309, VAR-201204-0212, VAR-201710-0080, VAR-201409-0064, VAR-201407-0367, VAR-202204-1470, VAR-202101-1034, VAR-201501-0336, VAR-201102-0310, VAR-202003-1181, VAR-201406-0304, VAR-202003-1185, VAR-201807-0427, VAR-201810-0632, VAR-201309-0032, VAR-201805-0499, VAR-202106-0900, VAR-201501-0332, VAR-201607-0431, VAR-201312-0457, VAR-201102-0053, VAR-201711-0379, VAR-201312-0252, VAR-201711-0380, VAR-201701-0722, VAR-201502-0125, VAR-201810-0587, VAR-201506-0295, VAR-201206-0109, VAR-202008-0832, VAR-201810-0590, VAR-201502-0127, VAR-201110-0449, VAR-201407-0368, VAR-201206-0110, VAR-201806-1040, VAR-201309-0031, VAR-201406-0312, VAR-201810-0629, VAR-201305-0117, VAR-201306-0137, VAR-202008-0833, VAR-201312-0459, VAR-201908-1009, VAR-201312-0248, VAR-201501-0223, VAR-202008-0817, VAR-201405-0474, VAR-202106-0915, VAR-201905-0509, VAR-201501-0337, VAR-201810-0630, VAR-201407-0374, VAR-201701-0721, VAR-201710-0636, VAR-202106-0916, VAR-201312-0254, VAR-202111-0401, VAR-202011-1012, VAR-201408-0152, VAR-200912-0439, VAR-201706-0585, VAR-201210-0317, VAR-201206-0108, VAR-201810-0625, VAR-201609-0381, VAR-201305-0118, VAR-201301-0152, VAR-201902-0458, VAR-201908-0854, VAR-202004-1237, VAR-202008-0820, VAR-201902-0445, VAR-201810-0628, VAR-201405-0481, VAR-201405-0479, VAR-202011-1013, VAR-202208-0240, VAR-201807-0431, VAR-202102-0578, VAR-201711-0376, VAR-201711-0370, VAR-201404-0564, VAR-201807-0426, VAR-201312-0256, VAR-201210-0318, VAR-201711-0359, VAR-201309-0035, VAR-201901-0358, VAR-202208-0238, VAR-201607-0428, VAR-201503-0171, VAR-202006-1134, VAR-201210-0313, VAR-201901-0354, VAR-201911-1776, VAR-201710-0662, VAR-202104-0452, VAR-201210-0314, VAR-200808-0182, VAR-201501-0335, VAR-201308-0092, VAR-201810-0331, VAR-201801-1059, VAR-201506-0252, VAR-201309-0033, VAR-201210-0315, VAR-201602-0050, VAR-202106-0911, VAR-202008-0798, VAR-202009-1173, VAR-200912-0442, VAR-201810-0624, VAR-201405-0477, VAR-201711-0378, VAR-201908-1010, VAR-201512-0417, VAR-201810-0300, VAR-201206-0112, VAR-201407-0369, VAR-202001-1197

Trust: 5.25

Fetched: Jan. 14, 2024, 9:32 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, improper validation, sql injection...
Affected productsExternal IDs
vendor: cisco model: cisco spark
vendor: cisco model: cisco webex meetings server
vendor: cisco model: webex training center
vendor: cisco model: webex meetings server
vendor: cisco model: webex meetings desktop
vendor: cisco model: rv345p
vendor: cisco model: webex meeting manager
vendor: cisco model: webex social
vendor: cisco model: webex meeting server
vendor: cisco model: cisco webex meetings desktop
vendor: cisco model: cisco webex social
vendor: cisco model: download manager
vendor: cisco model: webex teams
vendor: cisco model: cisco webex business suite
vendor: cisco model: cisco webex sales center
vendor: cisco model: asr 1000
vendor: cisco model: cisco webex meetings online
vendor: cisco model: rv340
vendor: cisco model: webex player
vendor: cisco model: cisco intelligent proximity
vendor: cisco model: webex meetings online
vendor: cisco model: cisco webex meetmenow
vendor: cisco model: webex sales center
vendor: cisco model: webex extension
vendor: cisco model: routers
vendor: cisco model: webex meetings desktop app
vendor: cisco model: webex meetings
vendor: cisco model: webex meetings player t29
vendor: cisco model: webex video mesh
vendor: cisco model: intelligent proximity
vendor: cisco model: webex
vendor: cisco model: link layer discovery protocol
vendor: cisco model: webex productivity tools
vendor: cisco model: meeting
vendor: cisco model: rv345
vendor: cisco model: cisco webex extension
vendor: cisco model: webex business suite
vendor: cisco model: gpccontainer class activex control
vendor: cisco model: cisco webex teams
vendor: cisco model: series
vendor: cisco model: meetings server
vendor: cisco model: cisco webex meeting center
vendor: cisco model: cisco webex connect im
vendor: cisco model: asr 1000 series
vendor: cisco model: cisco webex meeting manager
vendor: cisco model: webex meetings client
vendor: cisco model: webex meeting center
vendor: cisco model: cisco webex network recording player
vendor: cisco model: cisco quad
vendor: cisco model: cisco webex training center
vendor: cisco model: activetouch general plugin container
vendor: cisco model: meeting server
vendor: cisco model: webex meetings player t29.10
vendor: cisco model: webex support center
vendor: cisco model: cisco webex meetings
vendor: cisco model: webex meetmenow
vendor: cisco model: webex event center
vendor: cisco model: cisco webex
vendor: cisco model: spark
vendor: cisco model: webex network recording player
vendor: cisco model: cisco webex support center
vendor: cisco model: webex arf players
vendor: cisco model: gpccontainer class
vendor: cisco model: webex connect im
vendor: cisco model: webex meetings server 2.6
vendor: cisco model: webex meetings server 2.7
vendor: cisco model: cisco webex event center
vendor: cisco model: rv345p dual wan gigabit vpn routers
vendor: cisco model: webex meetings suite
vendor: cisco model: quad
vendor: cisco model: cisco webex productivity tools
vendor: cisco model: webex meetings server 2.5
vendor: mesh model: mesh
vendor: google model: android
vendor: google model: google chrome
vendor: google model: chrome
db: NVD ids: CVE-2020-3440, CVE-2018-0276, CVE-2022-20763, CVE-2015-0583, CVE-2014-0708, CVE-2013-6960, CVE-2017-12360, CVE-2013-1231, CVE-2013-1232, CVE-2015-0589, CVE-2018-0103, CVE-2020-27126, CVE-2013-5529, CVE-2020-3604, CVE-2021-1310, CVE-2015-4297, CVE-2018-15416, CVE-2016-1464, CVE-2013-1108, CVE-2016-1482, CVE-2013-6687, CVE-2016-1448, CVE-2021-1242, CVE-2020-3573, CVE-2020-3342, CVE-2018-15422, CVE-2012-1337, CVE-2020-3471, CVE-2013-6968, CVE-2014-8032, CVE-2013-1110, CVE-2018-0436, CVE-2020-7796, CVE-2013-3392, CVE-2016-1484, CVE-2010-3041, CVE-2020-3361, CVE-2019-1926, CVE-2019-1868, CVE-2018-15431, CVE-2014-0682, CVE-2014-8033, CVE-2014-8030, CVE-2020-3345, CVE-2020-3155, CVE-2013-6964, CVE-2013-6961, CVE-2013-1109, CVE-2019-1771, CVE-2020-3319, CVE-2018-15421, CVE-2019-1637, CVE-2013-1107, CVE-2019-16001, CVE-2019-16005, CVE-2021-1525, CVE-2018-0287, CVE-2017-3823, CVE-2020-3603, CVE-2013-6969, CVE-2010-3042, CVE-2017-12293, CVE-2023-20180, CVE-2021-1517, CVE-2020-3347, CVE-2018-15436, CVE-2019-15987, CVE-2019-15287, CVE-2021-1221, CVE-2017-12370, CVE-2017-12366, CVE-2018-0110, CVE-2020-3413, CVE-2016-4349, CVE-2023-20104, CVE-2016-1410, CVE-2019-1640, CVE-2020-3194, CVE-2014-2133, CVE-2013-6972, CVE-2015-0634, CVE-2017-12372, CVE-2016-1389, CVE-2019-1939, CVE-2015-0596, CVE-2013-1118, CVE-2009-2875, CVE-2015-4281, CVE-2019-1954, CVE-2021-1500, CVE-2017-3794, CVE-2017-6784, CVE-2015-4209, CVE-2018-0356, CVE-2018-0112, CVE-2012-6399, CVE-2019-1929, CVE-2020-3322, CVE-2019-1689, CVE-2017-6753, CVE-2023-20047, CVE-2013-6971, CVE-2012-3056, CVE-2013-3425, CVE-2013-6973, CVE-2018-15418, CVE-2016-1446, CVE-2006-3424, CVE-2015-4212, CVE-2017-12296, CVE-2019-1773, CVE-2018-0109, CVE-2018-15442, CVE-2014-3340, CVE-2016-1483, CVE-2014-3311, CVE-2021-1372, CVE-2021-40128, CVE-2020-3116, CVE-2019-1638, CVE-2017-3797, CVE-2019-1636, CVE-2017-12294, CVE-2013-6966, CVE-2012-3939, CVE-2018-15410, CVE-2020-3588, CVE-2018-0288, CVE-2021-1467, CVE-2020-3535, CVE-2018-15461, CVE-2017-6651, CVE-2017-12297, CVE-2022-20863, CVE-2019-1927, CVE-2014-3301, CVE-2016-1449, CVE-2009-2879, CVE-2019-1866, CVE-2015-4208, CVE-2013-6970, CVE-2021-1536, CVE-2020-3541, CVE-2020-3127, CVE-2009-2876, CVE-2009-2878, CVE-2018-15419, CVE-2014-3294, CVE-2017-3811, CVE-2019-1680, CVE-2018-0104, CVE-2018-15414, CVE-2019-1639, CVE-2015-4276, CVE-2012-1336, CVE-2017-3880, CVE-2010-3269, CVE-2017-12371, CVE-2014-2135, CVE-2013-6962, CVE-2021-1503, CVE-2020-3131, CVE-2015-4210, CVE-2019-15286, CVE-2013-6710, CVE-2020-3263, CVE-2019-15285, CVE-2017-12363, CVE-2018-0390, CVE-2018-0111, CVE-2021-34743, CVE-2011-4004, CVE-2017-3799, CVE-2014-3400, CVE-2019-1928, CVE-2010-3043, CVE-2012-1335, CVE-2014-0691, CVE-2014-3395, CVE-2014-3303, CVE-2022-20778, CVE-2021-1311, CVE-2023-20132, CVE-2006-3423, CVE-2014-8035, CVE-2010-3044, CVE-2020-3128, CVE-2014-3286, CVE-2020-3182, CVE-2018-0380, CVE-2018-15415, CVE-2013-1116, CVE-2018-0264, CVE-2021-1502, CVE-2014-8031, CVE-2007-6005, CVE-2016-1450, CVE-2013-6709, CVE-2010-3270, CVE-2017-12368, CVE-2013-6963, CVE-2017-12369, CVE-2017-3796, CVE-2015-0595, CVE-2018-15417, CVE-2015-4207, CVE-2012-3054, CVE-2020-3501, CVE-2018-15420, CVE-2015-0597, CVE-2011-3319, CVE-2014-3304, CVE-2012-3055, CVE-2018-0357, CVE-2013-1115, CVE-2014-3296, CVE-2018-15412, CVE-2013-1244, CVE-2013-1205, CVE-2020-3502, CVE-2013-6711, CVE-2019-1924, CVE-2013-6959, CVE-2015-0590, CVE-2020-3463, CVE-2014-2199, CVE-2021-1526, CVE-2019-1772, CVE-2014-8036, CVE-2018-15413, CVE-2014-3310, CVE-2017-3795, CVE-2017-12257, CVE-2021-1527, CVE-2013-6965, CVE-2021-40115, CVE-2020-3419, CVE-2014-3302, CVE-2009-2880, CVE-2017-6669, CVE-2012-3940, CVE-2012-3053, CVE-2018-15409, CVE-2016-1415, CVE-2013-1245, CVE-2012-6397, CVE-2019-1674, CVE-2019-1948, CVE-2019-16307, CVE-2019-15283, CVE-2020-3126, CVE-2020-3472, CVE-2019-1677, CVE-2018-15411, CVE-2014-2136, CVE-2014-2134, CVE-2020-3441, CVE-2022-20820, CVE-2023-20133, CVE-2018-0387, CVE-2021-1351, CVE-2017-12365, CVE-2017-12359, CVE-2014-2186, CVE-2018-0379, CVE-2013-6967, CVE-2012-3941, CVE-2023-20134, CVE-2017-12295, CVE-2013-1119, CVE-2019-1655, CVE-2022-20852, CVE-2016-1447, CVE-2015-0668, CVE-2020-3321, CVE-2012-3936, CVE-2019-1641, CVE-2019-15960, CVE-2017-12298, CVE-2021-1420, CVE-2012-3937, CVE-2008-3558, CVE-2014-8034, CVE-2013-3448, CVE-2019-15284, CVE-2018-0457, CVE-2018-0108, CVE-2015-4194, CVE-2013-1117, CVE-2012-3938, CVE-2016-1309, CVE-2021-1544, CVE-2020-3412, CVE-2020-3542, CVE-2009-2877, CVE-2018-15408, CVE-2014-2132, CVE-2017-12367, CVE-2019-1925, CVE-2015-6384, CVE-2018-0422, CVE-2012-3057, CVE-2014-3305, CVE-2020-3142

Trust: 5.75

Fetched: Jan. 14, 2024, 9:26 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: authentication bypass
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: routers
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
db: NVD ids: CVE-2023-20198
Related entries in the VARIoT vulnerabilities database: VAR-200411-0080, VAR-200809-0311, VAR-200803-0060, VAR-200809-0004, VAR-200803-0006, VAR-202012-1099, VAR-202204-1970, VAR-201708-0403, VAR-200605-0265, VAR-200508-0116, VAR-202208-2139, VAR-202002-0522, VAR-200803-0008, VAR-201101-0214, VAR-200801-0206, VAR-200806-0028, VAR-200505-0999, VAR-202002-0525, VAR-200810-0303, VAR-200710-0057, VAR-201810-1148, VAR-200508-0264, VAR-201006-0258, VAR-200905-0190, VAR-202002-0565, VAR-200107-0147, VAR-202301-0975, VAR-202301-0949, VAR-202012-1100, VAR-201006-0273, VAR-202301-0652, VAR-200803-0166, VAR-200408-0079, VAR-200412-0233, VAR-200509-0223, VAR-200509-0096, VAR-200905-0191, VAR-201411-0433, VAR-202305-2432, VAR-200905-0192, VAR-201910-1351, VAR-200212-0695, VAR-202012-1102, VAR-201810-1093, VAR-200610-0506, VAR-200203-0057, VAR-200703-0627, VAR-201409-0056, VAR-201409-0059, VAR-200707-0349, VAR-200211-0010, VAR-202010-0520, VAR-202002-0519, VAR-200312-0446, VAR-201207-0320, VAR-200906-0439, VAR-201111-0178, VAR-201006-0465, VAR-201906-0418, VAR-200905-0189, VAR-200612-0590, VAR-200812-0329, VAR-200803-0061, VAR-200509-0093, VAR-200601-0270, VAR-201409-0057, VAR-201907-1574, VAR-200803-0064, VAR-200212-0296, VAR-201810-1092, VAR-200909-0134, VAR-202208-1701, VAR-200412-0788, VAR-200803-0170, VAR-200505-0609, VAR-200412-0234, VAR-202002-0520, VAR-200812-0330, VAR-201111-0179, VAR-200905-0193, VAR-200208-0019, VAR-202012-1101, VAR-201911-1035, VAR-202002-0524, VAR-200604-0339, VAR-201809-0319, VAR-200603-0054, VAR-200212-0086, VAR-200704-0461, VAR-200809-0436, VAR-200603-0053, VAR-201712-0291, VAR-201409-0058, VAR-200805-0149, VAR-202001-1158, VAR-200803-0059, VAR-200512-0266, VAR-200905-0188, VAR-200810-0116, VAR-200902-0210, VAR-202002-0523, VAR-200211-0060, VAR-201411-0434, VAR-202102-1300, VAR-201906-0002, VAR-200905-0187, VAR-202002-0571, VAR-200108-0036, VAR-202002-0521, VAR-202305-2397, VAR-200703-0205, VAR-200803-0007, VAR-200212-0041, VAR-201906-0212, VAR-200911-0308, VAR-200611-0141, VAR-200809-0452, VAR-200509-0095, VAR-200509-0097

Trust: 6.25

Fetched: Jan. 14, 2024, 9:20 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: denial of service, directory traversal, os command injection...
Affected productsExternal IDs
vendor: broadcom model: adsl
vendor: broadcom model: bcmwl5.sys wireless device driver
vendor: broadcom model: linux
vendor: broadcom model: bcmwl5.sys
vendor: cisco model: wrt54g
vendor: cisco model: linksys e2000
vendor: cisco model: ip phone
vendor: cisco model: wag200g
vendor: cisco model: linksys wrt350n
vendor: cisco model: wrt300n
vendor: cisco model: linksys ea6500
vendor: cisco model: linksys e1200
vendor: cisco model: ea6200
vendor: cisco model: ea6400
vendor: cisco model: linksys
vendor: cisco model: ea4500
vendor: cisco model: spa-2102 phone adapter
vendor: cisco model: wag54gs
vendor: cisco model: cisco linksys playerpt activex control
vendor: cisco model: wrt54gl
vendor: cisco model: wrt54gc
vendor: cisco model: re6300
vendor: cisco model: e2500
vendor: cisco model: wvc54gca
vendor: cisco model: ea6900
vendor: cisco model: wvbr0
vendor: cisco model: wvc54gc
vendor: cisco model: ea6700
vendor: cisco model: router
vendor: cisco model: linksys wrt54g
vendor: cisco model: e4200v2
vendor: cisco model: linksys ea4500
vendor: cisco model: linksys wrt110
vendor: cisco model: routers
vendor: cisco model: ea2700
vendor: cisco model: linksys playerpt activex control
vendor: cisco model: wrt1900acs
vendor: cisco model: linksys wrt54gc
vendor: cisco model: spa941
vendor: cisco model: linksys e4200
vendor: cisco model: linksys routers
vendor: cisco model: e1200 firmware
vendor: cisco model: wag54g2
vendor: cisco model: re6400
vendor: cisco model: e2500 firmware
vendor: cisco model: wrt54gx
vendor: cisco model: wap54gv3
vendor: cisco model: access points
vendor: cisco model: wvc200 wireless-g ptz internet video camera
vendor: cisco model: wap4400n
vendor: cisco model: cisco wvc200 wireless-g ptz internet video camera
vendor: cisco model: wireless access point
vendor: cisco model: wvc200
vendor: cisco model: cisco linksys wrh54g
vendor: cisco model: linksys e2500
vendor: cisco model: linksys wrt54g router
vendor: cisco model: linksys wag200g
vendor: cisco model: ea6300
vendor: cisco model: velop
vendor: cisco model: linksys wrt54gc router
vendor: cisco model: wrt350n
vendor: cisco model: linksys wrt54g router firmware
vendor: cisco model: wip 330 wireless-g ip phone
vendor: cisco model: linksys wrh54g
vendor: cisco model: cisco linksys wrt350n
vendor: cisco model: ea3500
vendor: cisco model: cisco linksys wrt54gc
vendor: cisco model: linksys wrt54gx
vendor: cisco model: e1200
vendor: cisco model: linksys wrt160n
vendor: cisco model: ea6500 firmware
vendor: cisco model: wrt160n
vendor: cisco model: linksys wag54g2
vendor: cisco model: ea6500
vendor: cisco model: linksys wrt54gs
vendor: cisco model: wrt54gs
vendor: linksys model: wrt54g
vendor: linksys model: wag200g
vendor: linksys model: wrt300n
vendor: linksys model: befsru31
vendor: linksys model: ea6200
vendor: linksys model: ea6400
vendor: linksys model: ea4500
vendor: linksys model: spa-2102 phone adapter
vendor: linksys model: wag54gs
vendor: linksys model: wrt54gl
vendor: linksys model: wrt54gc
vendor: linksys model: re6300
vendor: linksys model: e2500
vendor: linksys model: befsr41
vendor: linksys model: wrt110
vendor: linksys model: wet11
vendor: linksys model: befsr11
vendor: linksys model: ea6900
vendor: linksys model: wvbr0
vendor: linksys model: wvc54gc
vendor: linksys model: ea6700
vendor: linksys model: e4200v2
vendor: linksys model: befsx41
vendor: linksys model: ea2700
vendor: linksys model: wrt1900acs
vendor: linksys model: spa941
vendor: linksys model: wag54g2
vendor: linksys model: re6400
vendor: linksys model: wrt54gx
vendor: linksys model: wap54gv3
vendor: linksys model: wap4400n
vendor: linksys model: rt31p2
vendor: linksys model: befw11s4
vendor: linksys model: ea6300
vendor: linksys model: velop
vendor: linksys model: wrt350n
vendor: linksys model: re6500
vendor: linksys model: befn2ps4
vendor: linksys model: wip 330 wireless-g ip phone
vendor: linksys model: befvp41
vendor: linksys model: befsr81
vendor: linksys model: wap55ag
vendor: linksys model: wpc300n wireless-n notebook adapter
vendor: linksys model: ea3500
vendor: linksys model: e1200
vendor: linksys model: wvc11b
vendor: linksys model: wrt160n
vendor: linksys model: rt31p2 voip router
vendor: linksys model: wap11
vendor: linksys model: spa941 voip phone
vendor: linksys model: ea6500
vendor: linksys model: wrt54gs
vendor: marvell model: semiconductor 88w8361p-bem1 chipset
vendor: alloy model: gl-2422ap-s
vendor: netgear model: me102
vendor: netgear model: router
vendor: wrt54g model: linksys
vendor: belkin model: linksys wrt1900acs
vendor: belkin model: linksys ea6500
vendor: belkin model: linksys e1200
vendor: belkin model: ea6400
vendor: belkin model: ea6900
vendor: belkin model: linksys velop
vendor: belkin model: router
vendor: belkin model: ea2700
vendor: belkin model: wrt1900acs
vendor: belkin model: linksys e4200
vendor: belkin model: linksys re6500
vendor: belkin model: linksys e2500
vendor: belkin model: ea6300
vendor: belkin model: linksys wrt160nl
vendor: belkin model: ea6500
vendor: belkin model: belkin linksys wrt160nl 1.0.04.002_us_20130619
vendor: d-link model: router
vendor: d-link model: di-804
vendor: d-link model: dl-704
vendor: marvell semiconductor model: semiconductor 88w8361p-bem1 chipset
vendor: wisecom model: gl2422ap-0t
vendor: apple model: safari
vendor: atmel model: 802.11b vnet-b access point
vendor: globalsuntech model: wisecom gl2422ap-0t
db: NVD ids: CVE-2004-0312, CVE-2008-1144, CVE-2008-1264, CVE-2008-1197, CVE-2007-6707, CVE-2020-35713, CVE-2022-24372, CVE-2017-10677, CVE-2006-2559, CVE-2022-35572, CVE-2005-2589, CVE-2022-38555, CVE-2013-2681, CVE-2007-6709, CVE-2011-0352, CVE-2008-0228, CVE-2008-2636, CVE-2005-1059, CVE-2013-2684, CVE-2008-4441, CVE-2007-5411, CVE-2018-3953, CVE-2005-2434, CVE-2010-2261, CVE-2009-1558, CVE-2013-3067, CVE-2001-0514, CVE-2022-43970, CVE-2022-43973, CVE-2020-35714, CVE-2010-1573, CVE-2022-43972, CVE-2008-1243, CVE-2004-0580, CVE-2004-2507, CVE-2005-2799, CVE-2005-2915, CVE-2009-1559, CVE-2014-8243, CVE-2023-31742, CVE-2009-1560, CVE-2013-4658, CVE-2002-2371, CVE-2020-35716, CVE-2018-3955, CVE-2006-5202, CVE-2002-0109, CVE-2007-1585, CVE-2013-3064, CVE-2013-3068, CVE-2007-3574, CVE-2002-1236, CVE-2023-31740, CVE-2020-26561, CVE-2013-2678, CVE-2003-1497, CVE-2012-0284, CVE-2009-2073, CVE-2011-4499, CVE-2010-2506, CVE-2019-7579, CVE-2009-1557, CVE-2006-6411, CVE-2008-4390, CVE-2008-1265, CVE-2005-2912, CVE-2006-0309, CVE-2013-3065, CVE-2019-11535, CVE-2022-38841, CVE-2008-1268, CVE-2002-1865, CVE-2018-3954, CVE-2009-3341, CVE-2022-38132, CVE-2004-2606, CVE-2009-5140, CVE-2008-1247, CVE-2005-0334, CVE-2004-2508, CVE-2013-2679, CVE-2008-4391, CVE-2011-4500, CVE-2009-1561, CVE-2002-0426, CVE-2020-35715, CVE-2019-16340, CVE-2013-2683, CVE-2006-1973, CVE-2018-17208, CVE-2006-1068, CVE-2002-2137, CVE-2007-2270, CVE-2008-4296, CVE-2006-1067, CVE-2017-17411, CVE-2022-43971, CVE-2013-3066, CVE-2008-2092, CVE-2013-5122, CVE-2008-1263, CVE-2005-4257, CVE-2009-1556, CVE-2008-4594, CVE-2008-6280, CVE-2013-2682, CVE-2002-1312, CVE-2014-8244, CVE-2021-25310, CVE-2009-5157, CVE-2009-1555, CVE-2013-3568, CVE-2001-1117, CVE-2013-2680, CVE-2023-31741, CVE-2006-7121, CVE-2007-6708, CVE-2002-2159, CVE-2019-7311, CVE-2007-5475, CVE-2006-5882, CVE-2007-5474, CVE-2005-2914, CVE-2005-2916

Trust: 3.5

Fetched: Jan. 14, 2024, 9:18 a.m., Published: Jan. 9, 2024, 6:54 p.m.
Vulnerabilities: feature bypass, security feature bypass, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-20700, CVE-2024-20674

Trust: 3.25

Fetched: Jan. 14, 2024, 9:18 a.m., Published: Jan. 11, 2024, midnight
Vulnerabilities: privilege escalation
Affected productsExternal IDs
db: NVD ids: CVE-2023-29357

Trust: 5.0

Fetched: Jan. 12, 2024, 9:54 a.m., Published: Jan. 10, 2024, 4 p.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs
vendor: cisco model: identity services engine
vendor: cisco model: cisco identity services engine

Trust: 3.5

Fetched: Jan. 12, 2024, 9:52 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.5

Fetched: Jan. 12, 2024, 9:52 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.25

Fetched: Jan. 12, 2024, 9:51 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-43115

Trust: 3.25

Fetched: Jan. 12, 2024, 9:51 a.m., Published: Jan. 10, 2024, 5:21 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-20666

Trust: 3.5

Fetched: Jan. 12, 2024, 9:50 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.0

Fetched: Jan. 12, 2024, 9:49 a.m., Published: Jan. 10, 2024, 7:36 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916

Trust: 5.0

Fetched: Jan. 12, 2024, 9:38 a.m., Published: Jan. 10, 2024, 10:05 a.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs
vendor: cisco model: identity services engine
vendor: cisco model: cisco identity services engine

Trust: 3.25

Fetched: Jan. 12, 2024, 9:33 a.m., Published: Jan. 11, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916