VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-202302-0482, VAR-202302-0195, VAR-202309-0672

Trust: 5.75

Fetched: Jan. 9, 2024, 10:11 a.m., Published: Jan. 5, 2024, 9:48 a.m.
Vulnerabilities: buffer overflow
Affected productsExternal IDs
vendor: unitronics model: visilogic
vendor: rockwell automation model: studio 5000
vendor: rockwell automation model: automation factorytalk
vendor: rockwell automation model: studio 5000 logix designer
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: factorytalk activation
vendor: rockwell automation model: automation factorytalk activation manager
vendor: rockwell model: studio 5000
vendor: rockwell model: automation factorytalk
vendor: rockwell model: studio 5000 logix designer
vendor: rockwell model: factorytalk
vendor: rockwell model: factorytalk activation
vendor: rockwell model: automation factorytalk activation manager
vendor: wibu model: codemeter
vendor: wibu model: codemeter runtime
vendor: wibu-systems model: codemeter
vendor: wibu-systems model: codemeter runtime
db: NVD ids: CVE-2022-4304, CVE-2022-4450, CVE-2023-3935, CVE-2023-0286, CVE-2023-38545, CVE-2023-6448
Related entries in the VARIoT vulnerabilities database: VAR-202004-2199, VAR-202004-2191, VAR-201712-0862, VAR-201801-0036, VAR-202110-1615

Trust: 5.25

Fetched: Jan. 9, 2024, 10:08 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, information disclosure, cross-site request forgery...
Affected productsExternal IDs
vendor: jquery model: jquery
vendor: typo3 model: typo3
db: NVD ids: CVE-2018-18405, CVE-2019-8121, CVE-2023-2582, CVE-2022-23395, CVE-2021-44030, CVE-2019-9951, CVE-2022-31147, CVE-2021-41184, CVE-2015-6969, CVE-2019-12308, CVE-2019-11358, CVE-2016-10707, CVE-2013-4634, CVE-2020-6978, CVE-2020-11023, CVE-2021-20086, CVE-2021-21252, CVE-2019-13488, CVE-2020-29587, CVE-2015-9444, CVE-2021-43862, CVE-2020-11022, CVE-2018-8768, CVE-2014-5259, CVE-2015-1840, CVE-2013-2023, CVE-2015-6584, CVE-2022-2144, CVE-2013-2022, CVE-2010-0760, CVE-2020-7656, CVE-2020-25814, CVE-2011-5180, CVE-2021-37504, CVE-2015-9479, CVE-2021-20084, CVE-2021-20083, CVE-2018-1325, CVE-2012-6662, CVE-2021-43306, CVE-2023-5113, CVE-2021-41182, CVE-2023-5464, CVE-2015-7943, CVE-2020-23064, CVE-2013-1808, CVE-2023-5432, CVE-2021-32682, CVE-2015-2982, CVE-2010-0759, CVE-2017-15719, CVE-2021-32821, CVE-2023-0171, CVE-2014-8739, CVE-2022-31160, CVE-2013-4997, CVE-2012-6708, CVE-2018-9206, CVE-2013-1942, CVE-2023-1275, CVE-2010-5312, CVE-2016-7103, CVE-2015-2089, CVE-2021-24543, CVE-2014-6071, CVE-2021-20087, CVE-2015-3233, CVE-2017-6929, CVE-2018-9207, CVE-2017-17560, CVE-2020-26120, CVE-2023-4890, CVE-2015-9251, CVE-2021-32860, CVE-2021-34663, CVE-2022-25495, CVE-2018-9208, CVE-2013-7129, CVE-2011-4969, CVE-2023-5430, CVE-2013-1463, CVE-2021-32850, CVE-2021-41183, CVE-2015-2531, CVE-2023-2648, CVE-2019-1010113, CVE-2021-43956, CVE-2007-2379, CVE-2013-0244, CVE-2013-4383, CVE-2021-36713

Trust: 3.75

Fetched: Jan. 9, 2024, 10:08 a.m., Published: March 1, 2019, 10:06 a.m.
Vulnerabilities: default password
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-201810-0187, VAR-201810-0185, VAR-201810-0186, VAR-200609-0527, VAR-201105-0133

Trust: 5.25

Fetched: Jan. 9, 2024, 10:06 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, integer overflow, search path vulnerability...
Affected productsExternal IDs
vendor: audiocodes model: 450hd
vendor: audiocodes model: 440hd
vendor: jquery model: jquery
vendor: polycom model: vvx 500
db: NVD ids: CVE-2005-2300, CVE-2017-0283, CVE-2023-5615, CVE-2017-9948, CVE-2019-13633, CVE-2016-3303, CVE-2021-26421, CVE-2023-31802, CVE-2020-1025, CVE-2008-4875, CVE-2004-1114, CVE-2017-11786, CVE-2015-6106, CVE-2023-36786, CVE-2009-4567, CVE-2016-0145, CVE-2016-3209, CVE-2007-4429, CVE-2008-0454, CVE-2017-6517, CVE-2016-3262, CVE-2023-2362, CVE-2004-1777, CVE-2022-26911, CVE-2017-8695, CVE-2016-3304, CVE-2023-36789, CVE-2018-0594, CVE-2004-1778, CVE-2014-6886, CVE-2016-3396, CVE-2018-18568, CVE-2008-4874, CVE-2019-0798, CVE-2015-2536, CVE-2008-0583, CVE-2016-3263, CVE-2006-2312, CVE-2019-0622, CVE-2019-0932, CVE-2005-3265, CVE-2023-41763, CVE-2021-24073, CVE-2020-1462, CVE-2015-2503, CVE-2021-24099, CVE-2017-0014, CVE-2007-3845, CVE-2023-36780, CVE-2019-1029, CVE-2017-8528, CVE-2005-3738, CVE-2016-4377, CVE-2017-8550, CVE-2017-0261, CVE-2005-3267, CVE-2018-18566, CVE-2018-18567, CVE-2017-8676, CVE-2019-1490, CVE-2015-6061, CVE-2016-7182, CVE-2011-1717, CVE-2017-0108, CVE-2007-5989, CVE-2021-39416, CVE-2010-3136, CVE-2014-3544, CVE-2018-0595, CVE-2018-8238, CVE-2006-5038, CVE-2022-26910, CVE-2021-36845, CVE-2008-5697, CVE-2016-5720, CVE-2017-0262, CVE-2007-3896, CVE-2005-1407, CVE-2018-8546, CVE-2017-0281, CVE-2020-24003, CVE-2017-8696, CVE-2015-6108, CVE-2018-8311, CVE-2009-4741, CVE-2008-2545, CVE-2019-0624, CVE-2020-25375, CVE-2020-27515, CVE-2015-2531, CVE-2022-33633, CVE-2008-0582, CVE-2022-34805, CVE-2011-2074, CVE-2021-26422, CVE-2020-1432, CVE-2015-6107, CVE-2016-3301, CVE-2022-24522, CVE-2006-5084, CVE-2008-1805
Related entries in the VARIoT vulnerabilities database: VAR-200809-0441, VAR-200212-0418, VAR-199905-0031, VAR-200204-0009, VAR-200703-0122, VAR-200508-0061, VAR-199912-0051, VAR-200411-0028, VAR-199912-0002, VAR-200911-0398, VAR-201404-0015, VAR-201006-1235, VAR-200211-0048, VAR-200208-0015, VAR-200109-0119, VAR-201009-0051, VAR-202104-1943, VAR-200010-0022, VAR-200111-0009, VAR-201211-0024, VAR-199701-0039, VAR-200109-0118, VAR-199912-0052, VAR-200212-0417, VAR-200507-0033, VAR-200003-0003, VAR-200005-0005, VAR-200204-0012, VAR-200408-0134, VAR-199912-0053, VAR-200211-0046, VAR-201110-0170, VAR-200212-0495, VAR-199901-0163, VAR-200901-0465, VAR-200106-0035, VAR-200208-0012, VAR-200002-0025, VAR-201703-1246, VAR-199906-0024, VAR-201009-0027, VAR-200204-0011, VAR-200204-0008, VAR-200212-0468, VAR-200007-0069, VAR-200306-0097, VAR-199909-0007, VAR-199905-0029, VAR-200007-0038, VAR-200012-0021, VAR-200912-0322, VAR-200612-0119, VAR-200906-0257, VAR-199901-0162, VAR-199901-0178, VAR-200607-0007, VAR-200908-0339, VAR-200612-0120, VAR-200006-0150, VAR-200107-0142, VAR-199908-0015, VAR-199905-0048, VAR-200005-0057, VAR-200010-0126, VAR-200012-0155, VAR-200306-0100, VAR-200102-0098, VAR-201211-0023, VAR-200904-0432, VAR-200012-0187, VAR-199908-0035, VAR-200512-1034, VAR-200705-0069, VAR-201411-0146, VAR-200007-0068, VAR-200212-0339, VAR-199905-0028, VAR-200904-0435, VAR-200809-0440, VAR-199902-0053, VAR-200909-0359, VAR-200003-0023, VAR-201112-0001, VAR-200011-0006, VAR-200102-0001, VAR-200106-0117, VAR-200211-0070, VAR-200204-0016, VAR-200802-0021, VAR-200101-0033, VAR-200303-0063, VAR-201810-0478, VAR-200204-0019, VAR-200612-0480, VAR-200205-0126, VAR-200204-0010, VAR-200204-0007, VAR-200204-0017, VAR-200012-0153, VAR-200204-0018, VAR-200212-0461, VAR-200112-0132, VAR-199912-0172, VAR-200004-0018, VAR-200212-0570, VAR-199905-0030, VAR-200005-0053, VAR-200310-0075, VAR-199907-0014, VAR-200810-0368, VAR-199912-0194, VAR-201012-0044, VAR-200101-0078, VAR-200211-0047, VAR-200109-0117, VAR-200212-0467, VAR-200102-0009, VAR-199907-0036, VAR-201009-0028, VAR-200306-0099, VAR-200705-0032, VAR-200005-0109, VAR-200107-0105, VAR-201002-0299, VAR-200106-0028, VAR-200306-0098, VAR-199908-0031, VAR-200006-0151, VAR-199912-0110, VAR-200106-0115, VAR-201108-0125, VAR-200912-0321, VAR-199901-0177, VAR-200901-0464, VAR-200802-0020, VAR-201508-0275, VAR-200906-0272, VAR-200207-0023, VAR-200106-0024, VAR-199902-0037, VAR-200109-0072

Trust: 5.25

Fetched: Jan. 9, 2024, 10:02 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: open redirect vulnerability, session hijacking, memory leak...
Affected productsExternal IDs
vendor: hitachi model: ucosminexus application server
vendor: hitachi model: web server
vendor: hitachi model: hirdb
vendor: hitachi model: jp1/performance management
vendor: novell model: zenworks
vendor: novell model: client
vendor: ge healthcare model: centricity pacs workstation
vendor: ge healthcare model: centricity pacs
vendor: carestream model: vue ris
vendor: carestream model: carestream vue ris
vendor: typo3 model: typo3
vendor: trend micro model: password manager
vendor: trend micro model: security
vendor: mailenable model: mailenable enterprise
vendor: mailenable model: enterprise
vendor: mailenable model: professional
vendor: trend model: password manager
vendor: trend model: security
vendor: rockwell automation model: automation factorytalk assetcentre
vendor: rockwell automation model: automation factorytalk
vendor: rockwell automation model: factorytalk
vendor: cisco model: series
vendor: cisco model: mobility manager
vendor: cisco model: information server
vendor: rockwell model: automation factorytalk assetcentre
vendor: rockwell model: automation factorytalk
vendor: rockwell model: factorytalk
vendor: symantec model: im manager
db: NVD ids: CVE-2008-4301, CVE-2023-6352, CVE-2002-1718, CVE-1999-0739, CVE-2002-0073, CVE-2007-1278, CVE-2005-2678, CVE-1999-0349, CVE-1999-1223, CVE-2003-0718, CVE-1999-1451, CVE-2009-3555, CVE-2012-5674, CVE-2011-5279, CVE-2010-1256, CVE-2002-1182, CVE-2002-0422, CVE-2001-0508, CVE-2010-1899, CVE-2021-27474, CVE-2000-0079, CVE-2000-0770, CVE-2001-0902, CVE-2012-2532, CVE-2019-1365, CVE-2008-3697, CVE-1999-0253, CVE-2001-0507, CVE-1999-1233, CVE-2019-11989, CVE-2002-1717, CVE-2005-2089, CVE-2002-0054, CVE-2000-0097, CVE-2007-4586, CVE-2010-1886, CVE-2000-0226, CVE-1999-1397, CVE-2000-0304, CVE-2002-0079, CVE-2020-1255, CVE-2017-0055, CVE-2004-0205, CVE-2011-1068, CVE-1999-1148, CVE-2002-1180, CVE-2005-4047, CVE-1999-0281, CVE-2007-6498, CVE-2011-2012, CVE-2018-18931, CVE-2015-1635, CVE-2002-1795, CVE-1999-0450, CVE-2007-6504, CVE-2004-1312, CVE-2003-1567, CVE-2015-7597, CVE-2003-1102, CVE-2001-0241, CVE-2002-0419, CVE-2000-0167, CVE-2008-2579, CVE-2017-7269, CVE-2009-1536, CVE-2002-1310, CVE-1999-0874, CVE-2013-3280, CVE-2010-2730, CVE-2002-0075, CVE-2022-30209, CVE-2018-16956, CVE-2002-0072, CVE-2018-16958, CVE-2002-1745, CVE-2020-0645, CVE-2000-0631, CVE-2003-1342, CVE-2003-0223, CVE-1999-0777, CVE-1999-0737, CVE-2000-0649, CVE-2000-0970, CVE-2009-4445, CVE-2001-0337, CVE-2018-1234, CVE-2006-6578, CVE-2009-1122, CVE-2021-24490, CVE-1999-0449, CVE-1999-1544, CVE-2006-0026, CVE-2018-1323, CVE-2020-1476, CVE-2009-3023, CVE-2008-5457, CVE-2006-6579, CVE-2001-1510, CVE-2001-0500, CVE-1999-0360, CVE-1999-0725, CVE-1999-0229, CVE-2019-0941, CVE-2000-0413, CVE-2000-0746, CVE-2000-0886, CVE-2016-0382, CVE-2000-0115, CVE-2003-0226, CVE-2002-1876, CVE-2003-0904, CVE-2001-0096, CVE-2000-0071, CVE-2012-2531, CVE-2014-5359, CVE-2009-1012, CVE-2000-0951, CVE-1999-0561, CVE-1999-0867, CVE-2005-4360, CVE-2010-3229, CVE-2001-1511, CVE-2008-2027, CVE-2007-2815, CVE-2004-0928, CVE-2014-4078, CVE-2000-0630, CVE-2002-1908, CVE-2023-24814, CVE-1999-0736, CVE-2020-5632, CVE-2009-2509, CVE-1999-0348, CVE-2009-1016, CVE-2003-1306, CVE-2023-3440, CVE-2008-4300, CVE-2006-1394, CVE-1999-0412, CVE-2009-2521, CVE-2001-0544, CVE-2000-0246, CVE-2001-0336, CVE-2007-6750, CVE-2000-0858, CVE-2000-1090, CVE-2015-7490, CVE-2018-1233, CVE-2008-1436, CVE-2004-0574, CVE-2001-0335, CVE-2001-0334, CVE-2002-0869, CVE-1999-0233, CVE-2002-0147, CVE-2019-12925, CVE-2008-0075, CVE-2000-1147, CVE-2003-0109, CVE-2018-17891, CVE-2002-0150, CVE-2018-14773, CVE-2006-5858, CVE-1999-1035, CVE-2002-0224, CVE-2002-0074, CVE-2002-0071, CVE-2002-0148, CVE-2000-0884, CVE-2002-2404, CVE-2002-0149, CVE-2000-0126, CVE-2002-1790, CVE-2002-0862, CVE-2001-1186, CVE-2000-0025, CVE-1999-1591, CVE-2000-0258, CVE-2002-1694, CVE-2003-0317, CVE-1999-0738, CVE-2018-20221, CVE-2020-1112, CVE-2000-0408, CVE-2003-0702, CVE-2007-6499, CVE-1999-1011, CVE-2005-0871, CVE-1999-1376, CVE-2008-1446, CVE-2000-0024, CVE-2018-18930, CVE-2001-0545, CVE-2005-4734, CVE-1999-0278, CVE-2013-0941, CVE-2011-3414, CVE-2010-3972, CVE-2000-1104, CVE-2002-1181, CVE-2012-4591, CVE-2001-0506, CVE-2010-0112, CVE-2010-2375, CVE-2002-1744, CVE-2007-0086, CVE-2001-0004, CVE-2007-0087, CVE-1999-1537, CVE-2023-36434, CVE-2002-0421, CVE-2018-1232, CVE-2010-2731, CVE-2003-0225, CVE-2000-0942, CVE-2007-2897, CVE-2001-0524, CVE-2000-0457, CVE-2013-1081, CVE-2001-1243, CVE-2009-4890, CVE-2003-1582, CVE-2001-0151, CVE-2013-0005, CVE-2003-0224, CVE-1999-0682, CVE-1999-0191, CVE-2000-0778, CVE-1999-0154, CVE-2001-0333, CVE-2003-0349, CVE-2003-0105, CVE-2022-36664, CVE-2011-3140, CVE-2009-4444, CVE-1999-1538, CVE-2003-1566, CVE-2011-4142, CVE-2002-1895, CVE-2016-0152, CVE-2016-0899, CVE-2008-0074, CVE-2003-0227, CVE-1999-0448, CVE-2002-1992, CVE-2022-42136, CVE-2014-4072, CVE-2013-7442, CVE-2009-1535, CVE-2002-1309, CVE-2002-0530, CVE-2002-0364, CVE-2001-0146, CVE-1999-0861, CVE-1999-0407, CVE-2010-3332, CVE-2006-0704, CVE-2001-0709
Related entries in the VARIoT vulnerabilities database: VAR-202001-0834, VAR-202008-0835, VAR-201412-0439, VAR-201806-0911, VAR-201906-0835, VAR-202206-0476, VAR-201011-0100, VAR-201808-0574, VAR-202103-0139, VAR-201705-3255, VAR-201310-0240, VAR-201906-0836, VAR-201804-1364, VAR-202206-1581, VAR-201804-1366, VAR-201310-0244, VAR-202106-1409, VAR-201906-0716, VAR-201212-0024, VAR-202101-0394, VAR-201704-1322, VAR-201705-3256, VAR-202111-1531, VAR-201704-1321, VAR-201906-0213, VAR-201310-0518, VAR-201310-0205, VAR-201712-0953, VAR-201310-0208, VAR-202010-1032, VAR-201310-0248, VAR-201911-1465, VAR-201808-0573, VAR-202001-0856, VAR-201310-0243, VAR-202103-0138, VAR-201812-0753, VAR-201704-1318, VAR-202104-1273, VAR-201401-0286, VAR-201711-0063, VAR-202106-1407, VAR-200710-0194, VAR-201909-1017, VAR-202206-2284, VAR-202206-0540, VAR-201802-0553, VAR-201703-0743, VAR-202204-1008, VAR-202203-1707, VAR-202001-0836, VAR-201801-1309, VAR-201011-0101, VAR-201412-0435, VAR-202103-0137, VAR-201907-1065, VAR-201403-0122, VAR-201911-1468, VAR-201703-0744, VAR-201501-0654, VAR-202203-0288, VAR-201802-0524, VAR-201407-0486, VAR-201806-1265, VAR-201906-0243, VAR-201311-0287, VAR-201711-1047, VAR-201310-0207, VAR-202001-0835, VAR-201911-1467, VAR-201812-0065, VAR-201808-0910, VAR-201704-1319, VAR-202101-0746, VAR-201802-0522, VAR-201912-1602, VAR-202206-1635, VAR-201210-0439, VAR-200906-0175, VAR-202203-1929, VAR-201704-1320, VAR-201011-0102, VAR-202104-0039, VAR-202111-0913, VAR-201807-0267, VAR-202012-0387, VAR-201011-0103, VAR-201909-1018, VAR-202103-0136, VAR-200710-0192, VAR-202002-0707, VAR-201802-0523, VAR-201802-0525, VAR-202106-1408, VAR-201911-1466, VAR-201912-1603, VAR-201310-0247, VAR-201804-1365, VAR-201611-0334, VAR-201704-1527, VAR-200710-0193, VAR-202105-0634, VAR-202008-0808, VAR-201703-1235, VAR-201405-0317, VAR-201704-1528, VAR-202102-0680, VAR-201401-0337, VAR-201011-0104, VAR-200408-0226, VAR-202103-0135

Trust: 5.25

Fetched: Jan. 9, 2024, 10 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: injection attack, code execution, information disclosure...
Affected productsExternal IDs
vendor: tp-link model: gateway
vendor: apexis model: apm-h803-mpc
vendor: samsung model: samsung smartthings hub
vendor: samsung model: smartthings hub
vendor: samsung model: samsung smartthings hub sth-eth-250
vendor: samsung model: smartthings hub sth-eth-250
vendor: samsung model: mobile
vendor: samsung model: note
vendor: samsung model: sth-eth-250
vendor: camtron model: cmnc-200
vendor: samsung smartthings model: samsung smartthings hub
vendor: samsung smartthings model: smartthings hub
vendor: samsung smartthings model: samsung smartthings hub sth-eth-250
vendor: samsung smartthings model: smartthings hub sth-eth-250
vendor: samsung smartthings model: mobile
vendor: samsung smartthings model: note
vendor: samsung smartthings model: sth-eth-250
vendor: grandstream model: gxv3601
vendor: grandstream model: gxv3651fhd
vendor: grandstream model: gxv3500
vendor: grandstream model: gxv3601hd/ll
vendor: grandstream model: gxv3504
vendor: grandstream model: gxv3501
vendor: grandstream model: gxv3611hd/ll
vendor: grandstream model: gxv3615w/p
vendor: grandstream model: gxv3615wp_hd
vendor: grandstream model: gxv3662hd
vendor: sony model: snc dh240t
vendor: sony model: snc dh180
vendor: sony model: snc ch240
vendor: sony model: snc ch140
vendor: sony model: snc dh280
vendor: sony model: snc ch280
vendor: sony model: snc ch180
vendor: sony model: snc dh140t
vendor: sony model: snc dh240
vendor: sony model: snc dh140
vendor: sony model: camera
vendor: vera model: veralite
vendor: vera model: veraedge
vendor: airlive model: wl2600cam
vendor: geutebruck model: g-cam
vendor: geutebruck model: g-cam/efd-2250
vendor: netwave model: ip camera firmware
vendor: netwave model: ip camera
vendor: foscam model: wireless ip camera
vendor: foscam model: ip camera
vendor: foscam model: fi8620
vendor: foscam model: system
vendor: insma model: wifi mini spy 1080p hd security ip camera
vendor: smartthings model: smartthings hub
vendor: dahua model: network camera
vendor: dahua model: ipc-hfw1xxx
vendor: dahua model: ip camera firmware
vendor: dahua model: ipc-hdw1xxx
vendor: dahua model: ipc-hfw2xxx
vendor: dahua model: ip camera
vendor: dahua model: camera
vendor: dahua model: camera firmware
vendor: tecvoz model: cmnc-200
vendor: conceptronic model: cipcamptiwl
vendor: vivotek model: pt7135
vendor: vivotek model: camera
vendor: vivotek model: pt7135 ip camera 0300a
vendor: wificam model: wireless ip camera
vendor: hisilicon model: hi3510 firmware
vendor: hisilicon model: hi3510
vendor: insteon model: hd ip camera white
vendor: insteon model: 2864-222
vendor: siemens model: cvms2025-ir
vendor: siemens model: cfis1425
vendor: siemens model: cvmw3025-ir
vendor: siemens model: ccmw3025
vendor: siemens model: ccis1425
vendor: siemens model: ccid1445-dn28
vendor: siemens model: ccmw1025
vendor: siemens model: ip camera
vendor: siemens model: ccpw3025
vendor: siemens model: ccmd3025-dn18
vendor: siemens model: cfms2025
vendor: siemens model: ccms2025
vendor: siemens model: ccid1445-dn18
vendor: siemens model: cfmw1025
vendor: siemens model: cfmw3025
vendor: siemens model: ccpw5025
vendor: bosch model: ip cameras
vendor: bosch model: iot gateway
vendor: bosch model: cpp6
vendor: bosch model: smart camera
vendor: bosch model: cpp7
vendor: bosch model: bosch ip cameras
vendor: bosch model: cpp7.3
vendor: hichip model: shenzhen hichip vision technology
vendor: hikvision model: ip cameras
vendor: hikvision model: ds-2cd7153-e
vendor: genie access model: wip3bvaf
vendor: loftek model: nexus 543
vendor: loftek model: nexus
vendor: axis model: m1033-w
vendor: axis model: ip cameras
vendor: axis model: p1354
vendor: axis model: network camera
vendor: axis model: axis m1033-w
vendor: axis model: 2100 network camera
vendor: apple model: watch
vendor: brickcom model: wcb-100ap
vendor: brickcom model: wfb-100ap
vendor: brickcom model: brickcom
vendor: brickcom model: md-100ap
vendor: brickcom model: osd-040e
vendor: brickcom model: fb-100ap
vendor: brickcom model: ob-100ae
vendor: d-link model: dcs-5222l
vendor: d-link model: dcs-936l
vendor: d-link model: dcs-5605 ptz ip network camera
vendor: d-link model: dcs-1100
vendor: d-link model: dcs-942l
vendor: d-link model: dcs-2121
vendor: d-link model: dcs-932l
vendor: d-link model: dcs-5222lb1
vendor: d-link model: camera stream client activex control
vendor: d-link model: dcs-5605
vendor: d-link model: dcs-825l
vendor: d-link model: dcs-5605 ptz
vendor: d-link model: dcs-2103 firmware
vendor: d-link model: dcs-1130
vendor: d-link model: dcs-8000lh
vendor: d-link model: dcs-900 internet camera
vendor: d-link model: dcs-820l
vendor: d-link model: dcs-5020l
vendor: d-link model: dcs-900
vendor: d-link model: dcs-855l
vendor: d-link model: dcs-2630l
vendor: d-link model: dcs-942lb1
vendor: d-link model: dcs-2103
vendor: jooan model: ip camera a5
vendor: intellinet model: nfc-30ir ip camera firmware
vendor: intellinet model: nfc-30ir ip camera
vendor: intellinet model: nfc-30ir
vendor: cisco model: 1100
vendor: cisco model: video surveillance 2500 series ip camera
vendor: cisco model: video surveillance 2500 series
vendor: cisco model: series
vendor: cisco model: cisco video surveillance 2500 series
vendor: cisco model: series ip camera
vendor: cisco model: cisco video surveillance 2500 series ip camera
vendor: cisco model: video surveillance 2500
vendor: cisco model: nexus
vendor: ichano model: athome ip camera
vendor: trendnet model: ip camera
vendor: edimax model: ic-3140w
vendor: edimax model: plug
db: NVD ids: CVE-2013-1594, CVE-2020-3506, CVE-2014-9238, CVE-2023-30352, CVE-2018-11560, CVE-2017-9391, CVE-2019-25062, CVE-2010-4230, CVE-2018-11654, CVE-2019-10711, CVE-2023-6248, CVE-2020-19643, CVE-2017-5173, CVE-2013-3541, CVE-2017-9392, CVE-2018-9156, CVE-2022-31873, CVE-2023-39509, CVE-2018-9158, CVE-2013-3540, CVE-2021-23852, CVE-2017-18377, CVE-2012-4046, CVE-2020-27542, CVE-2017-8225, CVE-2017-5174, CVE-2020-7879, CVE-2018-17240, CVE-2017-8224, CVE-2019-7315, CVE-2020-11623, CVE-2013-5535, CVE-2023-30356, CVE-2013-3687, CVE-2017-17761, CVE-2013-3690, CVE-2020-3544, CVE-2013-3963, CVE-2013-3311, CVE-2018-11653, CVE-2013-2574, CVE-2013-3539, CVE-2020-19642, CVE-2018-20342, CVE-2017-8221, CVE-2021-30166, CVE-2020-11624, CVE-2020-7057, CVE-2013-7204, CVE-2017-16566, CVE-2021-23847, CVE-2007-5214, CVE-2023-30351, CVE-2019-14457, CVE-2021-41506, CVE-2019-25063, CVE-2017-17101, CVE-2017-5674, CVE-2022-28743, CVE-2021-23850, CVE-2013-1596, CVE-2018-6479, CVE-2010-4231, CVE-2023-0773, CVE-2014-9234, CVE-2020-19641, CVE-2017-8405, CVE-2022-41677, CVE-2013-4977, CVE-2013-3314, CVE-2017-5675, CVE-2023-6118, CVE-2014-9517, CVE-2021-4045, CVE-2017-11634, CVE-2014-3895, CVE-2018-12640, CVE-2019-9676, CVE-2013-5215, CVE-2017-9315, CVE-2022-34138, CVE-2013-3689, CVE-2013-1595, CVE-2023-30354, CVE-2013-3313, CVE-2018-18441, CVE-2018-3867, CVE-2023-31995, CVE-2017-8222, CVE-2021-1131, CVE-2017-11632, CVE-2013-4975, CVE-2023-30353, CVE-2022-31875, CVE-2012-5306, CVE-2009-2046, CVE-2021-23851, CVE-2017-8223, CVE-2010-4232, CVE-2019-20463, CVE-2021-26611, CVE-2017-3223, CVE-2020-26762, CVE-2010-4233, CVE-2019-14458, CVE-2019-18382, CVE-2021-45039, CVE-2020-19640, CVE-2020-11625, CVE-2023-31996, CVE-2007-5212, CVE-2020-3110, CVE-2017-11633, CVE-2023-31994, CVE-2017-11635, CVE-2021-23848, CVE-2022-23382, CVE-2013-3312, CVE-2013-4976, CVE-2013-3962, CVE-2018-9157, CVE-2016-9155, CVE-2017-7461, CVE-2007-5213, CVE-2021-1521, CVE-2020-3507, CVE-2017-7253, CVE-2013-3686, CVE-2014-1849, CVE-2017-7462, CVE-2020-7848, CVE-2014-0673, CVE-2010-4234, CVE-2004-1650, CVE-2020-19639, CVE-2023-30146

Trust: 4.0

Fetched: Jan. 9, 2024, 9:59 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: command injection
Affected productsExternal IDs
db: NVD ids: CVE-2021-27561
Related entries in the VARIoT vulnerabilities database: VAR-201810-1413, VAR-202102-0157, VAR-201808-0455, VAR-200412-0263, VAR-201901-1500, VAR-201206-0202

Trust: 5.5

Fetched: Jan. 9, 2024, 9:48 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, connection slot exhaustion, denial of service...
Affected productsExternal IDs
vendor: matt model: dropbear ssh server
vendor: matt model: dropbear ssh
vendor: supermicro model: intelligent platform management interface
vendor: supermicro model: intelligent platform management
vendor: filezilla model: server
vendor: auto-maskin model: dcu-210e
vendor: auto-maskin model: dcu 210e
vendor: auto-maskin model: dcu 210e firmware
vendor: proftpd model: proftpd
vendor: node.js model: node.js
vendor: mofi model: mofi4500-4gxelte
vendor: mofi model: network mofi4500-4gxelte 4.1.5-std
vendor: matt johnston model: dropbear ssh server
vendor: matt johnston model: dropbear ssh
vendor: dropbear model: ssh server
vendor: dropbear model: dropbear ssh
vendor: netgate model: pfsense
db: NVD ids: CVE-2018-5399, CVE-2016-7407, CVE-2017-9079, CVE-2013-3619, CVE-2023-0344, CVE-2021-36369, CVE-2017-2659, CVE-2020-15833, CVE-2016-3115, CVE-2023-48795, CVE-2018-15599, CVE-2016-7409, CVE-2005-4178, CVE-2016-7408, CVE-2018-15473, CVE-2013-4421, CVE-2004-2486, CVE-2020-36254, CVE-2022-28369, CVE-2018-20685, CVE-2006-1206, CVE-2019-12953, CVE-2013-4434, CVE-2017-9078, CVE-2006-0225, CVE-2016-7406, CVE-2007-1099, CVE-2016-3116, CVE-2012-0920

Trust: 4.25

Fetched: Jan. 9, 2024, 9:47 a.m., Published: Dec. 19, 2023, midnight
Vulnerabilities: use after free
Affected productsExternal IDs
db: NVD ids: CVE-2022-30539

Trust: 3.75

Fetched: Jan. 9, 2024, 9:45 a.m., Published: Dec. 13, 2023, 5:01 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs

Trust: 4.75

Fetched: Jan. 9, 2024, 9:45 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, command execution
Affected productsExternal IDs
db: NVD ids: CVE-2022-1471, CVE-2023-22522, CVE-2023-22523, CVE-2022-0543, CVE-2023-29324, CVE-2023-23397, CVE-2023-22524
Related entries in the VARIoT vulnerabilities database: VAR-201209-0244, VAR-202102-0544, VAR-202002-0716, VAR-202105-0614, VAR-202105-0499, VAR-201705-3257, VAR-201711-0313, VAR-202009-0943, VAR-201503-0067, VAR-201708-1064, VAR-202106-0634, VAR-201012-0061, VAR-201703-1294, VAR-201411-0377, VAR-201209-0075, VAR-202007-1276, VAR-202203-1519, VAR-201804-0552, VAR-201206-0104, VAR-201201-0165, VAR-201704-1015, VAR-202209-0676, VAR-201901-0599, VAR-201708-1065, VAR-202106-1418, VAR-202204-1933, VAR-201706-0651, VAR-201207-0136, VAR-202112-0015, VAR-201008-0241, VAR-201508-0386, VAR-201802-1251, VAR-201008-0111, VAR-202104-0465, VAR-201708-0949, VAR-201702-0679, VAR-201202-0238, VAR-202210-0810, VAR-202109-1926, VAR-201711-0975, VAR-201805-0169, VAR-202302-0008, VAR-202105-0498, VAR-201512-0014, VAR-201207-0173, VAR-201801-0231, VAR-202112-0376, VAR-202204-1649, VAR-202008-0801, VAR-201604-0365, VAR-202208-0551, VAR-201902-0568, VAR-202111-0251, VAR-202105-0496, VAR-201704-0158, VAR-202204-0322, VAR-201503-0334, VAR-201811-0562, VAR-201708-1062, VAR-202205-0360, VAR-202101-1014, VAR-201810-0395, VAR-201809-0290, VAR-201401-0042, VAR-201503-0335, VAR-201607-0459, VAR-201708-1063, VAR-202004-1806, VAR-201802-0931, VAR-202101-1060, VAR-202006-1520, VAR-201412-0108, VAR-201711-0410, VAR-202010-1197, VAR-202105-0497, VAR-201803-1846, VAR-201603-0203, VAR-202010-1022, VAR-201312-0003, VAR-202105-0495, VAR-201202-0239, VAR-201205-0302, VAR-201209-0242, VAR-202302-0082, VAR-201711-0314, VAR-202109-1535, VAR-201906-0353, VAR-202207-1541

Trust: 6.25

Fetched: Jan. 9, 2024, 9:39 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: path element vulnerability, code execution, search path vulnerability...
Affected productsExternal IDs
vendor: forescout model: forescout counteract
vendor: forescout model: counteract
vendor: samsung model: mobile
vendor: samsung model: kies
vendor: samsung model: notes
vendor: samsung model: samsung kies
vendor: samsung model: note
vendor: sophos model: endpoint protection
vendor: sophos model: mobile
vendor: sophos model: anti-virus
vendor: zoho model: manageengine desktop central
vendor: measuresoft model: scadapro
vendor: measuresoft model: scadapro server
vendor: measuresoft model: scadapro client
vendor: cimon model: cmnview
vendor: cimon model: ultimateaccess
vendor: node.js model: node.js
vendor: dell model: precision optimizer
vendor: dell model: sonicwall netextender
vendor: dell model: emc powerstore
vendor: trend model: internet security
vendor: trend model: trend micro endpoint sensor
vendor: trend model: endpoint sensor
vendor: trend model: trend micro housecall
vendor: trend model: password manager
vendor: trend model: trend micro security
vendor: trend model: micro endpoint sensor
vendor: trend model: micro housecall
vendor: trend model: antivirus
vendor: trend model: housecall
vendor: trend model: security
vendor: trend model: micro password manager
vendor: avast model: anti-virus
vendor: avast model: antivirus
vendor: moxa model: softnvr-ia
vendor: moxa model: softnvr-ia live viewer
vendor: axis model: communications
vendor: axis model: gear
vendor: rockwell model: automation factorytalk services
vendor: rockwell model: automation connected components workbench
vendor: rockwell model: factorytalk view
vendor: rockwell model: factorytalk services platform
vendor: rockwell model: automation factorytalk services platform
vendor: rockwell model: factorytalk
vendor: rockwell model: factorytalk view studio
vendor: rockwell model: automation factorytalk
vendor: rockwell model: connected components workbench
vendor: fuji electric model: energy savings estimator
vendor: fuji electric model: fuji electric energy savings estimator
vendor: delta model: diaenergie
vendor: delta model: iexplorer
vendor: eaton model: 9000x
vendor: eaton model: drive
vendor: schneider model: somachine hvac
vendor: schneider model: somove software
vendor: schneider model: interactive graphical scada system
vendor: schneider model: premium
vendor: schneider model: somove
vendor: schneider model: schneider electric software update
vendor: schneider model: monitor
vendor: schneider model: sesu
vendor: schneider model: wonderware system platform 2014
vendor: schneider model: igss
vendor: schneider model: wonderware historian
vendor: schneider model: software update
vendor: schneider model: somachine
vendor: schneider model: wonderware intouch
vendor: fuji model: energy savings estimator
vendor: fuji model: fuji electric energy savings estimator
vendor: 7-technologies model: interactive graphical scada system
vendor: 7-technologies model: termis
vendor: 7-technologies model: aquis
vendor: check point model: check point
vendor: check point model: endpoint security
vendor: sielco model: winlog pro
vendor: sielco model: winlog lite
vendor: sielco model: sistemi winlog lite
vendor: sielco model: sistemi winlog lite scada
vendor: invensys model: foxboro control software
vendor: invensys model: infusion ce/fe/scada
vendor: invensys model: wonderware historian
vendor: invensys model: wonderware application server
vendor: invensys model: wonderware information server
vendor: invensys model: intouch
vendor: invensys model: wonderware intouch
vendor: attachmate model: reflection
vendor: ecava model: integraxor
vendor: ecava model: ecava integraxor
vendor: google model: home
vendor: qnap model: photo station
vendor: synology model: photo station
vendor: automationdirect model: gs drives
vendor: automationdirect model: gs drives configuration software
vendor: automationdirect model: sl-soft solo temperature controller
vendor: automationdirect model: c-more micro
vendor: automationdirect model: click programming software
vendor: automationdirect model: c-more programming software
vendor: automationdirect model: sl-soft solo temperature controller configuration software
vendor: automationdirect model: sl-soft solo
vendor: automationdirect model: c-more
vendor: automationdirect model: click
vendor: lenovo model: thinkpad
vendor: lenovo model: desktop
vendor: lenovo model: edge
vendor: lenovo model: system
vendor: dell emc model: precision optimizer
vendor: dell emc model: sonicwall netextender
vendor: dell emc model: emc powerstore
vendor: huawei model: utps
vendor: huawei model: espace desktop v200r003c00
vendor: huawei model: hisuite
vendor: huawei model: mobile partner
vendor: huawei model: espace
vendor: huawei model: espace desktop
vendor: huawei model: huawei
vendor: clamav model: clamav
vendor: trend micro model: internet security
vendor: trend micro model: trend micro endpoint sensor
vendor: trend micro model: endpoint sensor
vendor: trend micro model: trend micro housecall
vendor: trend micro model: password manager
vendor: trend micro model: trend micro security
vendor: trend micro model: micro endpoint sensor
vendor: trend micro model: micro housecall
vendor: trend micro model: antivirus
vendor: trend micro model: housecall
vendor: trend micro model: security
vendor: trend micro model: micro password manager
vendor: delta electronics model: diaenergie
vendor: delta electronics model: iexplorer
vendor: sielco sistemi model: winlog pro
vendor: sielco sistemi model: winlog lite
vendor: sielco sistemi model: sistemi winlog lite
vendor: sielco sistemi model: sistemi winlog lite scada
vendor: schneider electric model: somachine hvac
vendor: schneider electric model: somove software
vendor: schneider electric model: interactive graphical scada system
vendor: schneider electric model: premium
vendor: schneider electric model: somove
vendor: schneider electric model: schneider electric software update
vendor: schneider electric model: monitor
vendor: schneider electric model: sesu
vendor: schneider electric model: wonderware system platform 2014
vendor: schneider electric model: igss
vendor: schneider electric model: wonderware historian
vendor: schneider electric model: software update
vendor: schneider electric model: somachine
vendor: schneider electric model: wonderware intouch
vendor: snort model: snort
vendor: siemens model: simatic pdm
vendor: siemens model: simatic pcs
vendor: siemens model: simatic
vendor: siemens model: simatic pcs7
vendor: siemens model: simatic step 7
vendor: siemens model: pcs 7
vendor: siemens model: sinamics
vendor: siemens model: simatic step
vendor: siemens model: td keypad designer
vendor: siemens model: starter
vendor: siemens model: pcs7
vendor: siemens model: simatic pcs 7
vendor: realflex model: realwindemo
vendor: realflex model: flexview
vendor: realflex model: realwin
vendor: elipse model: elipse e3
vendor: apple model: safari
vendor: apple model: itunes
vendor: d-link model: central wifimanager
vendor: cisco model: meeting
vendor: cisco model: clamav
vendor: cisco model: cisco packet tracer
vendor: cisco model: webex
vendor: cisco model: webex teams
vendor: cisco model: intrusion prevention system
vendor: cisco model: advanced malware protection
vendor: cisco model: cisco anyconnect secure mobility client
vendor: cisco model: cisco webex
vendor: cisco model: cisco vpn client
vendor: cisco model: packet tracer
vendor: cisco model: series
vendor: cisco model: technical support
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: network academy packet tracer
vendor: cisco model: cisco webex teams
vendor: cisco model: vpn client
vendor: cisco model: information server
vendor: wireshark model: wireshark
vendor: symantec model: endpoint protection
vendor: symantec model: symantec endpoint protection
vendor: symantec model: client security
vendor: symantec model: antivirus
vendor: advantech model: webaccess
vendor: advantech model: studio
vendor: advantech model: advantech webaccess
vendor: aveva model: edge
vendor: aveva model: intouch
vendor: sonicwall model: switch
vendor: sonicwall model: netextender
vendor: sonicwall model: remote access
vendor: lg electronics model: mobile
vendor: quick heal model: quick heal
vendor: wonderware model: inbatch
vendor: wonderware model: intouch
vendor: esignal model: esignal
vendor: rockwell automation model: automation factorytalk services
vendor: rockwell automation model: automation connected components workbench
vendor: rockwell automation model: factorytalk view
vendor: rockwell automation model: factorytalk services platform
vendor: rockwell automation model: automation factorytalk services platform
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: factorytalk view studio
vendor: rockwell automation model: automation factorytalk
vendor: rockwell automation model: connected components workbench
vendor: blackberry model: blackberry
vendor: blackberry model: link
db: NVD ids: CVE-2019-14969, CVE-2012-3004, CVE-2010-5200, CVE-2010-3191, CVE-2022-44744, CVE-2010-3914, CVE-2018-1437, CVE-2016-2542, CVE-2014-8394, CVE-2010-3134, CVE-2022-30696, CVE-2021-26750, CVE-2021-31853, CVE-2021-1366, CVE-2023-45252, CVE-2013-0733, CVE-2023-37849, CVE-2020-3153, CVE-2021-1496, CVE-2010-5259, CVE-2023-48677, CVE-2018-8090, CVE-2018-11551, CVE-2017-3013, CVE-2010-3132, CVE-2019-5539, CVE-2010-5231, CVE-2011-3360, CVE-2020-25174, CVE-2012-4880, CVE-2010-3403, CVE-2021-1430, CVE-2010-3967, CVE-2022-2313, CVE-2015-2473, CVE-2018-6700, CVE-2009-5118, CVE-2017-5176, CVE-2018-12449, CVE-2010-5265, CVE-2017-12312, CVE-2020-24158, CVE-2017-1000010, CVE-2021-38086, CVE-2012-4883, CVE-2010-5249, CVE-2010-3125, CVE-2020-35145, CVE-2015-0978, CVE-2017-11159, CVE-2020-7312, CVE-2021-22921, CVE-2021-1567, CVE-2012-2519, CVE-2020-7807, CVE-2017-7444, CVE-2010-4599, CVE-2019-7931, CVE-2022-47636, CVE-2017-6798, CVE-2010-5263, CVE-2015-8113, CVE-2020-4739, CVE-2014-8359, CVE-2010-5269, CVE-2014-3860, CVE-2017-11742, CVE-2019-15628, CVE-2010-5230, CVE-2021-44206, CVE-2022-34043, CVE-2020-9100, CVE-2012-4759, CVE-2010-5243, CVE-2010-3146, CVE-2010-5241, CVE-2022-1098, CVE-2019-5526, CVE-2017-2802, CVE-2010-3155, CVE-2010-3128, CVE-2010-3137, CVE-2012-2753, CVE-2022-23410, CVE-2021-43940, CVE-2011-1991, CVE-2011-4053, CVE-2022-23050, CVE-2012-1849, CVE-2017-6033, CVE-2022-39846, CVE-2010-5252, CVE-2018-15515, CVE-2010-3153, CVE-2013-0797, CVE-2021-41544, CVE-2021-38469, CVE-2010-5082, CVE-2010-3976, CVE-2020-9673, CVE-2017-11160, CVE-2019-8076, CVE-2010-3152, CVE-2018-6475, CVE-2023-28140, CVE-2023-41929, CVE-2018-15983, CVE-2014-8396, CVE-2010-5272, CVE-2021-28647, CVE-2021-23023, CVE-2021-20051, CVE-2017-3012, CVE-2017-7966, CVE-2018-15976, CVE-2019-20781, CVE-2019-4588, CVE-2013-1715, CVE-2010-5256, CVE-2010-5244, CVE-2010-5240, CVE-2020-24162, CVE-2023-44220, CVE-2014-1680, CVE-2010-3130, CVE-2012-3015, CVE-2021-32592, CVE-2010-3190, CVE-2016-6167, CVE-2010-5267, CVE-2010-3126, CVE-2013-0727, CVE-2012-4755, CVE-2015-3940, CVE-2020-29654, CVE-2021-38571, CVE-2010-3199, CVE-2018-7484, CVE-2010-3135, CVE-2010-5242, CVE-2023-0213, CVE-2021-1386, CVE-2021-25247, CVE-2022-32168, CVE-2017-6189, CVE-2013-3485, CVE-2019-20456, CVE-2017-12480, CVE-2023-48861, CVE-2011-2016, CVE-2016-4560, CVE-2020-11634, CVE-2014-9227, CVE-2011-0107, CVE-2020-12431, CVE-2010-5262, CVE-2019-20419, CVE-2021-35982, CVE-2022-36415, CVE-2020-13771, CVE-2010-3144, CVE-2011-5157, CVE-2015-0833, CVE-2019-14684, CVE-2015-1492, CVE-2010-5239, CVE-2020-29157, CVE-2017-5161, CVE-2017-5996, CVE-2019-18670, CVE-2018-18364, CVE-2012-0223, CVE-2010-5251, CVE-2010-5228, CVE-2020-24160, CVE-2023-4770, CVE-2022-33921, CVE-2010-5271, CVE-2020-8959, CVE-2014-8395, CVE-2020-9672, CVE-2016-4802, CVE-2017-4939, CVE-2012-4866, CVE-2010-5257, CVE-2019-14688, CVE-2023-22818, CVE-2021-38410, CVE-2020-3768, CVE-2017-8137, CVE-2011-0403, CVE-2017-5175, CVE-2023-41782, CVE-2022-42945, CVE-2017-15913, CVE-2023-35897, CVE-2023-22283, CVE-2023-47113, CVE-2019-11644, CVE-2018-1435, CVE-2021-45975, CVE-2010-5236, CVE-2021-1429, CVE-2021-22000, CVE-2007-6753, CVE-2010-5233, CVE-2022-45422, CVE-2015-7917, CVE-2010-3140, CVE-2022-27843, CVE-2017-2983, CVE-2012-3005, CVE-2022-48225, CVE-2021-42110, CVE-2017-5170, CVE-2019-7956, CVE-2011-0570, CVE-2022-28965, CVE-2010-5266, CVE-2010-5273, CVE-2020-8469, CVE-2010-3145, CVE-2022-38395, CVE-2021-20047, CVE-2022-27842, CVE-2010-5235, CVE-2022-44939, CVE-2016-1281, CVE-2010-3124, CVE-2019-1010100, CVE-2020-3433, CVE-2016-2780, CVE-2022-36840, CVE-2015-8264, CVE-2018-18333, CVE-2019-7961, CVE-2010-3129, CVE-2021-32580, CVE-2010-3148, CVE-2022-22996, CVE-2019-7870, CVE-2022-48223, CVE-2021-38416, CVE-2014-0619, CVE-2020-25502, CVE-2020-24161, CVE-2021-1427, CVE-2016-8274, CVE-2021-44198, CVE-2012-4882, CVE-2010-3154, CVE-2014-8393, CVE-2010-3149, CVE-2022-38633, CVE-2020-25244, CVE-2018-6306, CVE-2010-5213, CVE-2020-9367, CVE-2019-3613, CVE-2010-3147, CVE-2019-20406, CVE-2010-5250, CVE-2019-16001, CVE-2012-4881, CVE-2022-23449, CVE-2023-37243, CVE-2010-3142, CVE-2020-15723, CVE-2014-9207, CVE-2011-3503, CVE-2010-5270, CVE-2011-1980, CVE-2010-5253, CVE-2022-28792, CVE-2018-7799, CVE-2011-2100, CVE-2021-44199, CVE-2017-11157, CVE-2010-5268, CVE-2022-28714, CVE-2015-5652, CVE-2010-3133, CVE-2010-2600, CVE-2023-2355, CVE-2021-1240, CVE-2019-4732, CVE-2018-14812, CVE-2012-4206, CVE-2011-2009, CVE-2011-1975, CVE-2019-19364, CVE-2019-9116, CVE-2018-13806, CVE-2019-12177, CVE-2010-3150, CVE-2020-24159, CVE-2010-5245, CVE-2023-41613, CVE-2019-3667, CVE-2020-4623, CVE-2019-7960, CVE-2022-48077, CVE-2019-3646, CVE-2010-3136, CVE-2019-14686, CVE-2023-28080, CVE-2017-13070, CVE-2010-3966, CVE-2010-5255, CVE-2019-19689, CVE-2019-17665, CVE-2018-7884, CVE-2019-8062, CVE-2018-6318, CVE-2016-7085, CVE-2022-30744, CVE-2023-28929, CVE-2021-44205, CVE-2012-5459, CVE-2013-1361, CVE-2010-5232, CVE-2014-9209, CVE-2016-5821, CVE-2020-7279, CVE-2020-16143, CVE-2022-40746, CVE-2017-11158, CVE-2020-8146, CVE-2020-3803, CVE-2018-6218, CVE-2010-4831, CVE-2010-4182, CVE-2019-14687, CVE-2012-0016, CVE-2022-32223, CVE-2012-3841, CVE-2020-15722, CVE-2010-5229, CVE-2019-7093, CVE-2018-15974, CVE-2010-5238, CVE-2017-12414, CVE-2017-11749, CVE-2019-7962, CVE-2010-3127, CVE-2020-28950, CVE-2021-1280, CVE-2020-26155, CVE-2017-11748, CVE-2010-3975, CVE-2020-7585, CVE-2014-9416, CVE-2021-45492, CVE-2016-10157, CVE-2012-1666, CVE-2010-5227, CVE-2019-13356, CVE-2011-0562, CVE-2010-5254, CVE-2017-14020, CVE-2020-5145, CVE-2019-20769, CVE-2010-3397, CVE-2021-1428, CVE-2010-3139, CVE-2021-28098, CVE-2020-6654, CVE-2010-3141, CVE-2018-1458, CVE-2022-36271, CVE-2014-9600, CVE-2010-5246, CVE-2010-3131, CVE-2018-7239, CVE-2010-5274, CVE-2012-0187, CVE-2016-1008, CVE-2011-3396, CVE-2023-25428, CVE-2011-1247, CVE-2010-5264, CVE-2011-2019, CVE-2021-33436, CVE-2018-5003, CVE-2016-1417, CVE-2010-5248, CVE-2012-0305, CVE-2020-3535, CVE-2021-42923, CVE-2010-3402, CVE-2010-1819, CVE-2021-1426, CVE-2016-2521, CVE-2012-0224, CVE-2011-0575, CVE-2012-1824, CVE-2011-0029, CVE-2022-31467, CVE-2020-25045, CVE-2011-0588, CVE-2010-5237, CVE-2015-2264, CVE-2020-9418, CVE-2010-5258, CVE-2012-3052, CVE-2010-4833, CVE-2023-28260, CVE-2011-0032, CVE-2019-20400, CVE-2020-15724, CVE-2019-3587, CVE-2010-3151, CVE-2010-3143, CVE-2019-16407, CVE-2023-29187, CVE-2023-22358, CVE-2017-12313, CVE-2018-18913, CVE-2023-41840, CVE-2023-4931, CVE-2010-5226, CVE-2022-25154, CVE-2016-5720, CVE-2020-15145, CVE-2010-5247, CVE-2022-38611, CVE-2021-36297, CVE-2019-5245, CVE-2014-8398, CVE-2010-5234, CVE-2018-20211, CVE-2011-5158, CVE-2023-45248, CVE-2017-7327, CVE-2014-8397, CVE-2020-12891, CVE-2010-5261, CVE-2022-32498, CVE-2010-5260

Trust: 5.25

Fetched: Jan. 9, 2024, 9:24 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: side channel attack, value injection, code execution...
Affected productsExternal IDs
vendor: tp-link model: routers
vendor: tp-link model: archer c5
vendor: bouncy castle model: bouncy castle
vendor: archos model: safe-t
vendor: archos model: core
vendor: archos model: archos safe-t
vendor: shapeshift model: keepkey
vendor: hyundai model: hk-1000
vendor: hyundai model: kasse hk-1000
vendor: kasse model: hyundai pay kasse hk-1000
vendor: ledger model: nano x
vendor: mooltipass model: mini
vendor: fortigate model: fortios
vendor: apple model: tvos
vendor: apple model: webkit
vendor: apple model: safari
vendor: d-link model: router
vendor: d-link model: dir-842 firmware
vendor: d-link model: dir-842
vendor: cisco model: router
vendor: cisco model: routers
vendor: cisco model: asa software
vendor: cisco model: series
vendor: cisco model: firepower threat defense
vendor: cisco model: guard
vendor: cisco model: series switches
vendor: cisco model: firepower
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco adaptive security appliance
vendor: yubico model: yubikey
vendor: google model: google chrome
vendor: google model: chrome
vendor: google model: android
vendor: matrixssl model: matrixssl
db: NVD ids: CVE-2018-0498, CVE-2021-39756, CVE-2022-20307, CVE-2023-34324, CVE-2014-3477, CVE-2019-14357, CVE-2018-3693, CVE-2019-14359, CVE-2019-10483, CVE-2013-5915, CVE-2019-18222, CVE-2019-14007, CVE-2023-6458, CVE-2021-24119, CVE-2020-36424, CVE-2021-0425, CVE-2018-20436, CVE-2011-4108, CVE-2022-20252, CVE-2019-20399, CVE-2020-12402, CVE-2023-21323, CVE-2022-20264, CVE-2018-11845, CVE-2021-39754, CVE-2019-7308, CVE-2022-48251, CVE-2022-4304, CVE-2017-7526, CVE-2016-8871, CVE-2020-15926, CVE-2017-5753, CVE-2016-7153, CVE-2014-0076, CVE-2015-2877, CVE-2018-12435, CVE-2017-0379, CVE-2023-21317, CVE-2018-12127, CVE-2019-13629, CVE-2022-4499, CVE-2021-1023, CVE-2021-1014, CVE-2014-4024, CVE-2019-12904, CVE-2023-21335, CVE-2017-5927, CVE-2016-2085, CVE-2016-0887, CVE-2019-1547, CVE-2022-20318, CVE-2020-27170, CVE-2023-21344, CVE-2023-21306, CVE-2019-11091, CVE-2016-6489, CVE-2019-14318, CVE-2022-20251, CVE-2018-12130, CVE-2018-5407, CVE-2021-26318, CVE-2023-52323, CVE-2018-12434, CVE-2023-21293, CVE-2018-3616, CVE-2018-0495, CVE-2007-3108, CVE-2021-0988, CVE-2020-16012, CVE-2023-26556, CVE-2021-39761, CVE-2018-1388, CVE-2018-9056, CVE-2018-12436, CVE-2021-39791, CVE-2022-20279, CVE-2023-21302, CVE-2021-39775, CVE-2018-0734, CVE-2022-37459, CVE-2018-6260, CVE-2023-21332, CVE-2022-2612, CVE-2017-5715, CVE-2019-14356, CVE-2010-3332, CVE-2018-12404, CVE-2018-12438, CVE-2021-1005, CVE-2018-13906, CVE-2019-14353, CVE-2023-20569, CVE-2021-37963, CVE-2019-25003, CVE-2012-4929, CVE-2020-15107, CVE-2019-10482, CVE-2020-12912, CVE-2023-40090, CVE-2015-5730, CVE-2023-21336, CVE-2023-32691, CVE-2020-26263, CVE-2016-6882, CVE-2019-13628, CVE-2019-18673, CVE-2023-21348, CVE-2018-16868, CVE-2016-8100, CVE-2021-24117, CVE-2020-4661, CVE-2019-9494, CVE-2022-20320, CVE-2019-11743, CVE-2022-20249, CVE-2023-26557, CVE-2022-48570, CVE-2019-14360, CVE-2013-4242, CVE-2022-20535, CVE-2021-0978, CVE-2021-44421, CVE-2019-13377, CVE-2021-21173, CVE-2023-21300, CVE-2022-24043, CVE-2020-36422, CVE-2013-1624, CVE-2021-39755, CVE-2021-33560, CVE-2014-0984, CVE-2021-0995, CVE-2021-0983, CVE-2013-4165, CVE-2023-21325, CVE-2022-20288, CVE-2020-0464, CVE-2016-4745, CVE-2022-26296, CVE-2021-21181, CVE-2011-1945, CVE-2021-1013, CVE-2019-19963, CVE-2019-16863, CVE-2012-4930, CVE-2018-3646, CVE-2021-39745, CVE-2018-10846, CVE-2019-14358, CVE-2013-4576, CVE-2012-0390, CVE-2023-21171, CVE-2022-23303, CVE-2021-46778, CVE-2023-4421, CVE-2023-21318, CVE-2021-1026, CVE-2020-0551, CVE-2018-3639, CVE-2022-20242, CVE-2019-14355, CVE-2021-0987, CVE-2023-21303, CVE-2021-33624, CVE-2021-1015, CVE-2022-20866, CVE-2016-2178, CVE-2013-1618, CVE-2017-7006, CVE-2012-3519, CVE-2020-35473, CVE-2017-5754, CVE-2023-21327, CVE-2023-21333, CVE-2023-21320, CVE-2023-28971, CVE-2022-20293, CVE-2020-6521, CVE-2022-23304, CVE-2018-12126, CVE-2022-20332, CVE-2020-8807, CVE-2018-3640, CVE-2015-0837, CVE-2021-34556, CVE-2018-0497, CVE-2020-6531, CVE-2022-20538, CVE-2022-0823, CVE-2018-12437, CVE-2016-2849, CVE-2023-0574, CVE-2017-12872, CVE-2021-35477, CVE-2021-39760, CVE-2023-21316, CVE-2023-21345, CVE-2018-20187, CVE-2018-3626, CVE-2023-50979, CVE-2021-0989, CVE-2014-0852, CVE-2022-20287, CVE-2018-11846, CVE-2023-21319, CVE-2018-12440, CVE-2023-21324, CVE-2018-3615, CVE-2019-16910, CVE-2013-1623, CVE-2021-39773, CVE-2021-0734, CVE-2023-6135, CVE-2019-15809, CVE-2023-20583, CVE-2021-0975, CVE-2017-5926, CVE-2018-0735, CVE-2018-16869, CVE-2022-20309, CVE-2022-20559, CVE-2018-3665, CVE-2022-26382, CVE-2021-29155, CVE-2017-5925, CVE-2022-35888, CVE-2020-10932, CVE-2021-1031, CVE-2019-9495, CVE-2023-21296, CVE-2021-39788, CVE-2015-7511, CVE-2019-15703, CVE-2020-4699, CVE-2018-0737, CVE-2015-5738, CVE-2021-1030, CVE-2017-13218, CVE-2022-20275, CVE-2021-31829, CVE-2021-24116, CVE-2019-13420, CVE-2013-1620, CVE-2023-21350, CVE-2021-1009, CVE-2023-37479, CVE-2021-43823, CVE-2018-11820, CVE-2017-9526, CVE-2023-20575, CVE-2023-21305, CVE-2023-21337, CVE-2021-1012, CVE-2013-1619, CVE-2016-9074, CVE-2022-20276, CVE-2018-12433, CVE-2022-25332, CVE-2020-25082, CVE-2016-0702, CVE-2022-20277, CVE-2020-12400, CVE-2023-32342, CVE-2015-10004, CVE-2021-1018, CVE-2023-21330, CVE-2019-11135, CVE-2020-11020, CVE-2021-39744, CVE-2020-28368, CVE-2020-27171, CVE-2021-0321, CVE-2023-33850, CVE-2018-3620, CVE-2019-14354, CVE-2023-21299, CVE-2022-20324, CVE-2021-39766, CVE-2023-25000, CVE-2020-11713, CVE-2018-5913, CVE-2023-0361, CVE-2022-20289, CVE-2021-0524, CVE-2020-4660, CVE-2014-5270, CVE-2023-21301, CVE-2014-0006, CVE-2020-36421, CVE-2018-12439, CVE-2022-46487, CVE-2023-21326, CVE-2021-3011, CVE-2013-0169, CVE-2017-5361, CVE-2020-16150, CVE-2020-0087, CVE-2022-23643, CVE-2019-10071, CVE-2023-24025, CVE-2022-20285, CVE-2017-5681, CVE-2021-0990, CVE-2020-13844, CVE-2023-21331, CVE-2022-20304, CVE-2016-7152, CVE-2017-14737, CVE-2021-27342, CVE-2010-0009, CVE-2019-14067, CVE-2022-20531, CVE-2023-21349, CVE-2020-11683, CVE-2023-21304, CVE-2023-21346, CVE-2023-21354, CVE-2021-1032, CVE-2022-20291, CVE-2022-20316, CVE-2023-21338, CVE-2023-21298, CVE-2019-19960, CVE-2020-1459, CVE-2022-40525

Trust: 4.25

Fetched: Jan. 9, 2024, 9:18 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: configuration error, request smuggling attack, cross-site request forgery...
Affected productsExternal IDs
vendor: kemp model: web application firewall
vendor: monitorapp model: web application firewall
vendor: monitorapp model: application insight web application
vendor: node.js model: node.js
vendor: denyall model: web application firewall
vendor: denyall model: denyall waf
vendor: denyall model: i-suite
vendor: phion model: airlock web application firewall
vendor: radware model: appwall web application firewall
vendor: radware model: appwall
vendor: radware model: gateway
vendor: tile model: slim
vendor: barracuda model: web application firewall
vendor: barracuda model: load balancer
vendor: barracuda model: barracuda web application firewall
vendor: barracuda model: running
vendor: barracuda model: barracuda
vendor: cisco model: firepower 9300
vendor: cisco model: series
vendor: cisco model: firepower 9300 security appliance
vendor: cisco model: ace xml gateway
vendor: cisco model: ace web application firewall
vendor: cisco model: fxos
vendor: cisco model: firepower
vendor: cisco model: firepower 4100 series next-generation firewall
vendor: cisco model: technical support
vendor: imperva model: imperva securesphere web application firewall
vendor: imperva model: web application firewall
vendor: imperva model: securesphere web application firewall
vendor: armorlogic model: profense web application firewall
vendor: armorlogic model: profense
db: NVD ids: CVE-2022-39957, CVE-2009-0467, CVE-2017-15524, CVE-2021-43800, CVE-2023-30536, CVE-2020-13483, CVE-2009-2299, CVE-2010-1329, CVE-2007-2832, CVE-2020-26815, CVE-2020-13758, CVE-2022-21698, CVE-2019-8933, CVE-2011-5266, CVE-2005-2088, CVE-2022-39956, CVE-2021-23028, CVE-2011-4887, CVE-2023-40586, CVE-2023-45132, CVE-2022-1669, CVE-2020-15236, CVE-2022-23031, CVE-2022-39958, CVE-2021-36982, CVE-2005-2090, CVE-2021-32693, CVE-2009-3457, CVE-2005-3751, CVE-2005-2091, CVE-2021-0269, CVE-2021-33683, CVE-2018-9230, CVE-2018-15904, CVE-2009-2300, CVE-2005-2092, CVE-2022-48279, CVE-2021-41242, CVE-2011-3140, CVE-2009-1745, CVE-2011-0767, CVE-2005-2094, CVE-2023-24021, CVE-2005-2089, CVE-2009-1593, CVE-2021-36921, CVE-2005-2093, CVE-2017-14706, CVE-2009-0468, CVE-2021-45468, CVE-2022-38381, CVE-2021-23029, CVE-2017-14705, CVE-2020-6282, CVE-2022-45778, CVE-2021-41823, CVE-2018-19991, CVE-2023-4309, CVE-2018-0300, CVE-2014-2595, CVE-2009-2301, CVE-2009-1594, CVE-2022-29183
Related entries in the VARIoT vulnerabilities database: VAR-201703-1111, VAR-201111-0176, VAR-202101-1832, VAR-202007-0769, VAR-202305-0063, VAR-201911-0467, VAR-202104-1216, VAR-201807-0053, VAR-201911-0481, VAR-202104-1666, VAR-201810-0734, VAR-202204-1675, VAR-202203-1868, VAR-202002-0890, VAR-202203-1484, VAR-200511-0356, VAR-202206-2326, VAR-202104-1362, VAR-201803-0962, VAR-201705-3167, VAR-201501-0697, VAR-201705-4025, VAR-201708-0882, VAR-202301-0789, VAR-202306-0752, VAR-201708-1179, VAR-202111-0625, VAR-201911-0479, VAR-201807-0761, VAR-200902-0648, VAR-202206-1629, VAR-201911-0477, VAR-201911-0472, VAR-202212-1460, VAR-202112-2028, VAR-201911-0483, VAR-201805-0312, VAR-201705-3190, VAR-201808-0275, VAR-201905-0803, VAR-202301-0790, VAR-202302-0263, VAR-201909-1469, VAR-201911-1650, VAR-201801-0536, VAR-202309-1961, VAR-202001-1689, VAR-202309-0563, VAR-202202-1691, VAR-202201-0076, VAR-201401-0526, VAR-201404-0636, VAR-201804-1564, VAR-201512-0513, VAR-202104-1355, VAR-201703-1109, VAR-202201-0174, VAR-202302-0295, VAR-201910-0889, VAR-202102-0536, VAR-201512-0510, VAR-202210-0241, VAR-202210-1161, VAR-201810-0731, VAR-201807-0054, VAR-202309-0437, VAR-201404-0120, VAR-202109-1087, VAR-202309-0545, VAR-202111-1224, VAR-201911-0473, VAR-202002-0891, VAR-201707-0535, VAR-201911-0465, VAR-201502-0387, VAR-201905-0806, VAR-201805-0314, VAR-202307-2189, VAR-201911-0478, VAR-202309-0527, VAR-201701-0755, VAR-201801-0578, VAR-202204-1409, VAR-202104-1363, VAR-201905-0802, VAR-201904-0566, VAR-201502-0454, VAR-202104-1364, VAR-202204-1779, VAR-201911-0482, VAR-202302-1223, VAR-202306-0893, VAR-202204-1803, VAR-201812-0061, VAR-201906-0726, VAR-202307-2191, VAR-201708-0884, VAR-200909-0397, VAR-201911-0461, VAR-202204-1268, VAR-201911-0463, VAR-201908-1823, VAR-202309-0729, VAR-201503-0298, VAR-202309-0562, VAR-202307-1969, VAR-202104-1360, VAR-201904-0573, VAR-201911-0464, VAR-202102-1432, VAR-201812-0111, VAR-201512-0511, VAR-202307-2004, VAR-202201-1471, VAR-202302-2072, VAR-202207-0160, VAR-201911-0466, VAR-201707-0387, VAR-202111-1223, VAR-201911-0462, VAR-202104-1202, VAR-202305-1438, VAR-202206-1464, VAR-202306-1065, VAR-202306-0932, VAR-201912-1499, VAR-202204-1408, VAR-201509-0182, VAR-201812-0123, VAR-202104-1361, VAR-201912-1497, VAR-202111-1635, VAR-202308-2159, VAR-201502-0455, VAR-201905-0804, VAR-201703-0032, VAR-201801-0538, VAR-201905-0805, VAR-201209-0472, VAR-201911-0475, VAR-201911-0469, VAR-201310-0217, VAR-202104-1359, VAR-202204-1549, VAR-202101-0545, VAR-202105-1346, VAR-202008-0672, VAR-201911-0468, VAR-201211-0020, VAR-200511-0357, VAR-202208-1474, VAR-202204-1734, VAR-201703-1110, VAR-201707-0400, VAR-202104-1357, VAR-201911-1519, VAR-201809-0839, VAR-201906-0727, VAR-202206-1716, VAR-201911-0487, VAR-202104-1217, VAR-202205-0904, VAR-200909-0395, VAR-202104-1593, VAR-201809-0837, VAR-201912-1498, VAR-201705-4026, VAR-201804-1341, VAR-201512-0512, VAR-201411-0483, VAR-201801-0537, VAR-202103-1352, VAR-202309-0509, VAR-202201-1903, VAR-202204-0727, VAR-201911-0480, VAR-201801-1645, VAR-201808-0559, VAR-201805-0313, VAR-201708-0883, VAR-201801-0577, VAR-202309-0494, VAR-200909-0396, VAR-201404-0447, VAR-202104-1350, VAR-201503-0303, VAR-201911-0488, VAR-202210-1645, VAR-201911-0471, VAR-200803-0466, VAR-201307-0434, VAR-202001-0883, VAR-201911-0476, VAR-201812-0060, VAR-201809-0840, VAR-201801-0535, VAR-201401-0239, VAR-201911-0470, VAR-201809-0838, VAR-202006-0751, VAR-202302-0417, VAR-201911-0460, VAR-201812-0059, VAR-201809-0357, VAR-202104-1352, VAR-202305-1464, VAR-202008-0673, VAR-202104-1594, VAR-202309-0477, VAR-202307-2190, VAR-202204-1269

Trust: 6.25

Fetched: Jan. 9, 2024, 9:15 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: access control issue, command execution, privilege escalation...
Affected productsExternal IDs
vendor: motorola model: android
vendor: motorola model: motorola
vendor: samsung model: notes
vendor: samsung model: note
vendor: broadcom model: linux
vendor: broadcom model: bcm4352
vendor: broadcom model: bcm4325
vendor: broadcom model: bcm4329
vendor: asustek model: rt-ac66u_b1
vendor: asustek model: dsl-n55u d1
vendor: asustek model: rt-ac68u router
vendor: asustek model: rt-n56u
vendor: asustek model: zenfone live android
vendor: asustek model: hg100
vendor: asustek model: rt-n14u
vendor: asustek model: zenfone max
vendor: asustek model: dsl-ac55u
vendor: asustek model: dsl-n66u
vendor: asustek model: rt-n14uhp
vendor: asustek model: rt-n600
vendor: asustek model: dsl-n12e c1
vendor: asustek model: rt-acrh13
vendor: asustek model: ux360ca bios
vendor: asustek model: zenfone live
vendor: asustek model: dsl-n10s
vendor: asustek model: rt-ac68u
vendor: asustek model: rt-ac58u 3.0.0.4.380_6516
vendor: asustek model: rt-ac750
vendor: asustek model: rt-ac88u
vendor: asustek model: rt-ac66u
vendor: asustek model: wl-330nul
vendor: asustek model: router
vendor: asustek model: rt-ac66u b1
vendor: asustek model: rt-ac56r
vendor: asustek model: asus_a002
vendor: asustek model: rt-ax92u
vendor: asustek model: dsl-ac52u
vendor: asustek model: rt-ac66w
vendor: asustek model: rt-ac51u
vendor: asustek model: net4switch
vendor: asustek model: rt-g32
vendor: asustek model: rt-n53
vendor: asustek model: dsl-ac750
vendor: asustek model: rt-ac52u_b1
vendor: asustek model: rt-n18u
vendor: asustek model: asuswrt-merlin firmware
vendor: asustek model: gt-ax11000
vendor: asustek model: ws-101
vendor: asustek model: dsl-n12e_c1
vendor: asustek model: routers
vendor: asustek model: rt-ac5300
vendor: asustek model: rt-ac1900p
vendor: asustek model: rt-n11p
vendor: asustek model: rt-ax3000
vendor: asustek model: rt-ac58u
vendor: asustek model: dsl-n55u
vendor: asustek model: rt-n56r
vendor: asustek model: rt-ax58u
vendor: asustek model: rt_ac1200gu
vendor: asustek model: ipswcom.dll activex component
vendor: asustek model: rp-ac52
vendor: asustek model: rt-ac55uhp
vendor: asustek model: asus firmware
vendor: asustek model: rt-n12hp
vendor: asustek model: rt-ac1900
vendor: asustek model: dsl-n14u
vendor: asustek model: dsl-n16
vendor: asustek model: rt series
vendor: asustek model: rt-ac66r
vendor: asustek model: rt-n12
vendor: asustek model: rt-series routers
vendor: asustek model: asuswrt
vendor: asustek model: rt-ac
vendor: asustek model: rt-n12e b1
vendor: asustek model: rt-ac87r
vendor: asustek model: asus_a002_2
vendor: asustek model: rt-n66r
vendor: asustek model: zenfone 3
vendor: asustek model: zenfone v live
vendor: asustek model: rt-ac68u firmware
vendor: asustek model: mw100
vendor: asustek model: dl-101
vendor: asustek model: rt-ac87u
vendor: asustek model: rt-ac53u
vendor: asustek model: rt-n12hp_b1
vendor: asustek model: dsl-n12e_c1 1.1.2.3_345
vendor: asustek model: rt-ac3200
vendor: asustek model: dsl-n12e
vendor: asustek model: rt-n12 d1
vendor: asustek model: rt-ax88u
vendor: asustek model: rt_ac1900p
vendor: asustek model: tm-ac1900
vendor: asustek model: rt-ac55u
vendor: asustek model: ts-101
vendor: asustek model: zenfone 4 selfie
vendor: asustek model: rt-n12d1
vendor: asustek model: rt-ac3100
vendor: asustek model: rt-n300
vendor: asustek model: rt-n66w
vendor: asustek model: zenfone 3 max
vendor: asustek model: zenfone 3 laser
vendor: asustek model: rt-ax86u
vendor: asustek model: rt-n10
vendor: asustek model: rt_ac1200g
vendor: asustek model: dsl-n16u
vendor: asustek model: dsl-n10s v2.1.16_apac
vendor: asustek model: zenfone 3 ultra
vendor: asustek model: dsl-n55u c1
vendor: asustek model: asuswrt-merlin
vendor: asustek model: dsl-ac56u
vendor: asustek model: rt-ac1200
vendor: asustek model: dsl-n12u c1
vendor: asustek model: asus
vendor: asustek model: ikvm
vendor: asustek model: rt-n16
vendor: asustek model: wrt firmware
vendor: asustek model: hg100 firmware
vendor: asustek model: dsl-n10_c1
vendor: asustek model: rt-ac2900
vendor: asustek model: rt-n10e
vendor: asustek model: rt-ax56u
vendor: asustek model: zenfone
vendor: asustek model: rt-n12vp
vendor: asustek model: rt-ac56s
vendor: asustek model: rt-ac86u
vendor: asustek model: as-101
vendor: asustek model: wrt firmware 3.0.0.4.376_1071
vendor: asustek model: rt-ac1200hp
vendor: asustek model: asus asus_x00k_1
vendor: asustek model: asus asus_x015_1
vendor: asustek model: rt-n
vendor: asustek model: zenfone max 4
vendor: asustek model: zenfone 5q
vendor: asustek model: rt-ac52u
vendor: asustek model: zenfone 5 lite
vendor: asustek model: aura sync
vendor: asustek model: asus wrt-ac66u
vendor: asustek model: asus_x00ld_3
vendor: asustek model: gt-ac2900
vendor: asustek model: rt-ac68w
vendor: asustek model: rt-ac53
vendor: asustek model: dsl-n14u-b1
vendor: asustek model: rt-n66u
vendor: asustek model: rt-ac68p
vendor: asustek model: rt-n56u wireless router
vendor: asustek model: zenfone ar
vendor: asustek model: wrt-ac66u
vendor: asustek model: ms-101
vendor: asustek model: rt-ac1750
vendor: asustek model: rt-ac68r
vendor: asustek model: gt-ac5300
vendor: asustek model: zenfone 3s max
vendor: asustek model: dsl-n17u
vendor: asustek model: rt-ac56u
vendor: asustek model: rt-ac52u b1
vendor: asustek model: rt-n65u
vendor: asustek model: dsl-ac51
vendor: asustek model: rt-ac87u firmware
vendor: asustek model: zenfone 5 selfie
vendor: asuswrt model: rt-ac66u_b1
vendor: asuswrt model: dsl-n55u d1
vendor: asuswrt model: rt-ac68u router
vendor: asuswrt model: rt-n56u
vendor: asuswrt model: zenfone live android
vendor: asuswrt model: hg100
vendor: asuswrt model: rt-n14u
vendor: asuswrt model: zenfone max
vendor: asuswrt model: dsl-ac55u
vendor: asuswrt model: dsl-n66u
vendor: asuswrt model: rt-n14uhp
vendor: asuswrt model: rt-n600
vendor: asuswrt model: dsl-n12e c1
vendor: asuswrt model: rt-acrh13
vendor: asuswrt model: ux360ca bios
vendor: asuswrt model: zenfone live
vendor: asuswrt model: dsl-n10s
vendor: asuswrt model: rt-ac68u
vendor: asuswrt model: rt-ac58u 3.0.0.4.380_6516
vendor: asuswrt model: rt-ac750
vendor: asuswrt model: rt-ac88u
vendor: asuswrt model: rt-ac66u
vendor: asuswrt model: wl-330nul
vendor: asuswrt model: router
vendor: asuswrt model: rt-ac66u b1
vendor: asuswrt model: rt-ac56r
vendor: asuswrt model: asus_a002
vendor: asuswrt model: rt-ax92u
vendor: asuswrt model: dsl-ac52u
vendor: asuswrt model: rt-ac66w
vendor: asuswrt model: rt-ac51u
vendor: asuswrt model: net4switch
vendor: asuswrt model: rt-g32
vendor: asuswrt model: rt-n53
vendor: asuswrt model: dsl-ac750
vendor: asuswrt model: rt-ac52u_b1
vendor: asuswrt model: rt-n18u
vendor: asuswrt model: asuswrt-merlin firmware
vendor: asuswrt model: gt-ax11000
vendor: asuswrt model: ws-101
vendor: asuswrt model: dsl-n12e_c1
vendor: asuswrt model: routers
vendor: asuswrt model: rt-ac5300
vendor: asuswrt model: rt-ac1900p
vendor: asuswrt model: rt-n11p
vendor: asuswrt model: rt-ax3000
vendor: asuswrt model: rt-ac58u
vendor: asuswrt model: dsl-n55u
vendor: asuswrt model: rt-n56r
vendor: asuswrt model: rt-ax58u
vendor: asuswrt model: rt_ac1200gu
vendor: asuswrt model: ipswcom.dll activex component
vendor: asuswrt model: rp-ac52
vendor: asuswrt model: rt-ac55uhp
vendor: asuswrt model: asus firmware
vendor: asuswrt model: rt-n12hp
vendor: asuswrt model: rt-ac1900
vendor: asuswrt model: dsl-n14u
vendor: asuswrt model: dsl-n16
vendor: asuswrt model: rt series
vendor: asuswrt model: rt-ac66r
vendor: asuswrt model: rt-n12
vendor: asuswrt model: rt-series routers
vendor: asuswrt model: asuswrt
vendor: asuswrt model: rt-ac
vendor: asuswrt model: rt-n12e b1
vendor: asuswrt model: rt-ac87r
vendor: asuswrt model: asus_a002_2
vendor: asuswrt model: rt-n66r
vendor: asuswrt model: zenfone 3
vendor: asuswrt model: zenfone v live
vendor: asuswrt model: rt-ac68u firmware
vendor: asuswrt model: mw100
vendor: asuswrt model: dl-101
vendor: asuswrt model: rt-ac87u
vendor: asuswrt model: rt-ac53u
vendor: asuswrt model: rt-n12hp_b1
vendor: asuswrt model: dsl-n12e_c1 1.1.2.3_345
vendor: asuswrt model: rt-ac3200
vendor: asuswrt model: dsl-n12e
vendor: asuswrt model: rt-n12 d1
vendor: asuswrt model: rt-ax88u
vendor: asuswrt model: rt_ac1900p
vendor: asuswrt model: tm-ac1900
vendor: asuswrt model: rt-ac55u
vendor: asuswrt model: ts-101
vendor: asuswrt model: zenfone 4 selfie
vendor: asuswrt model: rt-n12d1
vendor: asuswrt model: rt-ac3100
vendor: asuswrt model: rt-n300
vendor: asuswrt model: rt-n66w
vendor: asuswrt model: zenfone 3 max
vendor: asuswrt model: zenfone 3 laser
vendor: asuswrt model: rt-ax86u
vendor: asuswrt model: rt-n10
vendor: asuswrt model: rt_ac1200g
vendor: asuswrt model: dsl-n16u
vendor: asuswrt model: dsl-n10s v2.1.16_apac
vendor: asuswrt model: zenfone 3 ultra
vendor: asuswrt model: dsl-n55u c1
vendor: asuswrt model: asuswrt-merlin
vendor: asuswrt model: dsl-ac56u
vendor: asuswrt model: rt-ac1200
vendor: asuswrt model: dsl-n12u c1
vendor: asuswrt model: asus
vendor: asuswrt model: ikvm
vendor: asuswrt model: rt-n16
vendor: asuswrt model: wrt firmware
vendor: asuswrt model: hg100 firmware
vendor: asuswrt model: dsl-n10_c1
vendor: asuswrt model: rt-ac2900
vendor: asuswrt model: rt-n10e
vendor: asuswrt model: rt-ax56u
vendor: asuswrt model: zenfone
vendor: asuswrt model: rt-n12vp
vendor: asuswrt model: rt-ac56s
vendor: asuswrt model: rt-ac86u
vendor: asuswrt model: as-101
vendor: asuswrt model: wrt firmware 3.0.0.4.376_1071
vendor: asuswrt model: rt-ac1200hp
vendor: asuswrt model: asus asus_x00k_1
vendor: asuswrt model: asus asus_x015_1
vendor: asuswrt model: rt-n
vendor: asuswrt model: zenfone max 4
vendor: asuswrt model: zenfone 5q
vendor: asuswrt model: rt-ac52u
vendor: asuswrt model: zenfone 5 lite
vendor: asuswrt model: aura sync
vendor: asuswrt model: asus wrt-ac66u
vendor: asuswrt model: asus_x00ld_3
vendor: asuswrt model: gt-ac2900
vendor: asuswrt model: rt-ac68w
vendor: asuswrt model: rt-ac53
vendor: asuswrt model: dsl-n14u-b1
vendor: asuswrt model: rt-n66u
vendor: asuswrt model: rt-ac68p
vendor: asuswrt model: rt-n56u wireless router
vendor: asuswrt model: zenfone ar
vendor: asuswrt model: wrt-ac66u
vendor: asuswrt model: ms-101
vendor: asuswrt model: rt-ac1750
vendor: asuswrt model: rt-ac68r
vendor: asuswrt model: gt-ac5300
vendor: asuswrt model: zenfone 3s max
vendor: asuswrt model: dsl-n17u
vendor: asuswrt model: rt-ac56u
vendor: asuswrt model: rt-ac52u b1
vendor: asuswrt model: rt-n65u
vendor: asuswrt model: dsl-ac51
vendor: asuswrt model: rt-ac87u firmware
vendor: asuswrt model: zenfone 5 selfie
vendor: iperf model: iperf
vendor: nokia model: series
vendor: nokia model: impact
vendor: apple model: watch
vendor: asuswrt-merlin model: rt-ac66u_b1
vendor: asuswrt-merlin model: dsl-n55u d1
vendor: asuswrt-merlin model: rt-ac68u router
vendor: asuswrt-merlin model: rt-n56u
vendor: asuswrt-merlin model: zenfone live android
vendor: asuswrt-merlin model: hg100
vendor: asuswrt-merlin model: rt-n14u
vendor: asuswrt-merlin model: zenfone max
vendor: asuswrt-merlin model: dsl-ac55u
vendor: asuswrt-merlin model: dsl-n66u
vendor: asuswrt-merlin model: rt-n14uhp
vendor: asuswrt-merlin model: rt-n600
vendor: asuswrt-merlin model: dsl-n12e c1
vendor: asuswrt-merlin model: rt-acrh13
vendor: asuswrt-merlin model: ux360ca bios
vendor: asuswrt-merlin model: zenfone live
vendor: asuswrt-merlin model: dsl-n10s
vendor: asuswrt-merlin model: rt-ac68u
vendor: asuswrt-merlin model: rt-ac58u 3.0.0.4.380_6516
vendor: asuswrt-merlin model: rt-ac750
vendor: asuswrt-merlin model: rt-ac88u
vendor: asuswrt-merlin model: rt-ac66u
vendor: asuswrt-merlin model: wl-330nul
vendor: asuswrt-merlin model: router
vendor: asuswrt-merlin model: rt-ac66u b1
vendor: asuswrt-merlin model: rt-ac56r
vendor: asuswrt-merlin model: asus_a002
vendor: asuswrt-merlin model: rt-ax92u
vendor: asuswrt-merlin model: dsl-ac52u
vendor: asuswrt-merlin model: rt-ac66w
vendor: asuswrt-merlin model: rt-ac51u
vendor: asuswrt-merlin model: net4switch
vendor: asuswrt-merlin model: rt-g32
vendor: asuswrt-merlin model: rt-n53
vendor: asuswrt-merlin model: dsl-ac750
vendor: asuswrt-merlin model: rt-ac52u_b1
vendor: asuswrt-merlin model: rt-n18u
vendor: asuswrt-merlin model: asuswrt-merlin firmware
vendor: asuswrt-merlin model: gt-ax11000
vendor: asuswrt-merlin model: ws-101
vendor: asuswrt-merlin model: dsl-n12e_c1
vendor: asuswrt-merlin model: routers
vendor: asuswrt-merlin model: rt-ac5300
vendor: asuswrt-merlin model: rt-ac1900p
vendor: asuswrt-merlin model: rt-n11p
vendor: asuswrt-merlin model: rt-ax3000
vendor: asuswrt-merlin model: rt-ac58u
vendor: asuswrt-merlin model: dsl-n55u
vendor: asuswrt-merlin model: rt-n56r
vendor: asuswrt-merlin model: rt-ax58u
vendor: asuswrt-merlin model: rt_ac1200gu
vendor: asuswrt-merlin model: ipswcom.dll activex component
vendor: asuswrt-merlin model: rp-ac52
vendor: asuswrt-merlin model: rt-ac55uhp
vendor: asuswrt-merlin model: asus firmware
vendor: asuswrt-merlin model: rt-n12hp
vendor: asuswrt-merlin model: rt-ac1900
vendor: asuswrt-merlin model: dsl-n14u
vendor: asuswrt-merlin model: dsl-n16
vendor: asuswrt-merlin model: rt series
vendor: asuswrt-merlin model: rt-ac66r
vendor: asuswrt-merlin model: rt-n12
vendor: asuswrt-merlin model: rt-series routers
vendor: asuswrt-merlin model: asuswrt
vendor: asuswrt-merlin model: rt-ac
vendor: asuswrt-merlin model: rt-n12e b1
vendor: asuswrt-merlin model: rt-ac87r
vendor: asuswrt-merlin model: asus_a002_2
vendor: asuswrt-merlin model: rt-n66r
vendor: asuswrt-merlin model: zenfone 3
vendor: asuswrt-merlin model: zenfone v live
vendor: asuswrt-merlin model: rt-ac68u firmware
vendor: asuswrt-merlin model: mw100
vendor: asuswrt-merlin model: dl-101
vendor: asuswrt-merlin model: rt-ac87u
vendor: asuswrt-merlin model: rt-ac53u
vendor: asuswrt-merlin model: rt-n12hp_b1
vendor: asuswrt-merlin model: dsl-n12e_c1 1.1.2.3_345
vendor: asuswrt-merlin model: rt-ac3200
vendor: asuswrt-merlin model: dsl-n12e
vendor: asuswrt-merlin model: rt-n12 d1
vendor: asuswrt-merlin model: rt-ax88u
vendor: asuswrt-merlin model: rt_ac1900p
vendor: asuswrt-merlin model: tm-ac1900
vendor: asuswrt-merlin model: rt-ac55u
vendor: asuswrt-merlin model: ts-101
vendor: asuswrt-merlin model: zenfone 4 selfie
vendor: asuswrt-merlin model: rt-n12d1
vendor: asuswrt-merlin model: rt-ac3100
vendor: asuswrt-merlin model: rt-n300
vendor: asuswrt-merlin model: rt-n66w
vendor: asuswrt-merlin model: zenfone 3 max
vendor: asuswrt-merlin model: zenfone 3 laser
vendor: asuswrt-merlin model: rt-ax86u
vendor: asuswrt-merlin model: rt-n10
vendor: asuswrt-merlin model: rt_ac1200g
vendor: asuswrt-merlin model: dsl-n16u
vendor: asuswrt-merlin model: dsl-n10s v2.1.16_apac
vendor: asuswrt-merlin model: zenfone 3 ultra
vendor: asuswrt-merlin model: dsl-n55u c1
vendor: asuswrt-merlin model: asuswrt-merlin
vendor: asuswrt-merlin model: dsl-ac56u
vendor: asuswrt-merlin model: rt-ac1200
vendor: asuswrt-merlin model: dsl-n12u c1
vendor: asuswrt-merlin model: asus
vendor: asuswrt-merlin model: ikvm
vendor: asuswrt-merlin model: rt-n16
vendor: asuswrt-merlin model: wrt firmware
vendor: asuswrt-merlin model: hg100 firmware
vendor: asuswrt-merlin model: dsl-n10_c1
vendor: asuswrt-merlin model: rt-ac2900
vendor: asuswrt-merlin model: rt-n10e
vendor: asuswrt-merlin model: rt-ax56u
vendor: asuswrt-merlin model: zenfone
vendor: asuswrt-merlin model: rt-n12vp
vendor: asuswrt-merlin model: rt-ac56s
vendor: asuswrt-merlin model: rt-ac86u
vendor: asuswrt-merlin model: as-101
vendor: asuswrt-merlin model: wrt firmware 3.0.0.4.376_1071
vendor: asuswrt-merlin model: rt-ac1200hp
vendor: asuswrt-merlin model: asus asus_x00k_1
vendor: asuswrt-merlin model: asus asus_x015_1
vendor: asuswrt-merlin model: rt-n
vendor: asuswrt-merlin model: zenfone max 4
vendor: asuswrt-merlin model: zenfone 5q
vendor: asuswrt-merlin model: rt-ac52u
vendor: asuswrt-merlin model: zenfone 5 lite
vendor: asuswrt-merlin model: aura sync
vendor: asuswrt-merlin model: asus wrt-ac66u
vendor: asuswrt-merlin model: asus_x00ld_3
vendor: asuswrt-merlin model: gt-ac2900
vendor: asuswrt-merlin model: rt-ac68w
vendor: asuswrt-merlin model: rt-ac53
vendor: asuswrt-merlin model: dsl-n14u-b1
vendor: asuswrt-merlin model: rt-n66u
vendor: asuswrt-merlin model: rt-ac68p
vendor: asuswrt-merlin model: rt-n56u wireless router
vendor: asuswrt-merlin model: zenfone ar
vendor: asuswrt-merlin model: wrt-ac66u
vendor: asuswrt-merlin model: ms-101
vendor: asuswrt-merlin model: rt-ac1750
vendor: asuswrt-merlin model: rt-ac68r
vendor: asuswrt-merlin model: gt-ac5300
vendor: asuswrt-merlin model: zenfone 3s max
vendor: asuswrt-merlin model: dsl-n17u
vendor: asuswrt-merlin model: rt-ac56u
vendor: asuswrt-merlin model: rt-ac52u b1
vendor: asuswrt-merlin model: rt-n65u
vendor: asuswrt-merlin model: dsl-ac51
vendor: asuswrt-merlin model: rt-ac87u firmware
vendor: asuswrt-merlin model: zenfone 5 selfie
vendor: trendnet model: tew-812dru
vendor: asus model: rt-ac66u_b1
vendor: asus model: dsl-n55u d1
vendor: asus model: rt-ac68u router
vendor: asus model: rt-n56u
vendor: asus model: zenfone live android
vendor: asus model: hg100
vendor: asus model: rt-n14u
vendor: asus model: zenfone max
vendor: asus model: dsl-ac55u
vendor: asus model: dsl-n66u
vendor: asus model: rt-n14uhp
vendor: asus model: rt-n600
vendor: asus model: dsl-n12e c1
vendor: asus model: rt-acrh13
vendor: asus model: ux360ca bios
vendor: asus model: zenfone live
vendor: asus model: dsl-n10s
vendor: asus model: rt-ac68u
vendor: asus model: rt-ac58u 3.0.0.4.380_6516
vendor: asus model: rt-ac750
vendor: asus model: rt-ac88u
vendor: asus model: rt-ac66u
vendor: asus model: wl-330nul
vendor: asus model: router
vendor: asus model: rt-ac66u b1
vendor: asus model: rt-ac56r
vendor: asus model: asus_a002
vendor: asus model: rt-ax92u
vendor: asus model: dsl-ac52u
vendor: asus model: rt-ac66w
vendor: asus model: rt-ac51u
vendor: asus model: net4switch
vendor: asus model: rt-g32
vendor: asus model: rt-n53
vendor: asus model: dsl-ac750
vendor: asus model: rt-ac52u_b1
vendor: asus model: rt-n18u
vendor: asus model: asuswrt-merlin firmware
vendor: asus model: gt-ax11000
vendor: asus model: ws-101
vendor: asus model: dsl-n12e_c1
vendor: asus model: routers
vendor: asus model: rt-ac5300
vendor: asus model: rt-ac1900p
vendor: asus model: rt-n11p
vendor: asus model: rt-ax3000
vendor: asus model: rt-ac58u
vendor: asus model: dsl-n55u
vendor: asus model: rt-n56r
vendor: asus model: rt-ax58u
vendor: asus model: rt_ac1200gu
vendor: asus model: ipswcom.dll activex component
vendor: asus model: rp-ac52
vendor: asus model: rt-ac55uhp
vendor: asus model: asus firmware
vendor: asus model: rt-n12hp
vendor: asus model: rt-ac1900
vendor: asus model: dsl-n14u
vendor: asus model: dsl-n16
vendor: asus model: rt series
vendor: asus model: rt-ac66r
vendor: asus model: rt-n12
vendor: asus model: rt-series routers
vendor: asus model: asuswrt
vendor: asus model: rt-ac
vendor: asus model: rt-n12e b1
vendor: asus model: rt-ac87r
vendor: asus model: asus_a002_2
vendor: asus model: rt-n66r
vendor: asus model: zenfone 3
vendor: asus model: zenfone v live
vendor: asus model: rt-ac68u firmware
vendor: asus model: mw100
vendor: asus model: dl-101
vendor: asus model: rt-ac87u
vendor: asus model: rt-ac53u
vendor: asus model: rt-n12hp_b1
vendor: asus model: dsl-n12e_c1 1.1.2.3_345
vendor: asus model: rt-ac3200
vendor: asus model: dsl-n12e
vendor: asus model: rt-n12 d1
vendor: asus model: rt-ax88u
vendor: asus model: rt_ac1900p
vendor: asus model: tm-ac1900
vendor: asus model: rt-ac55u
vendor: asus model: ts-101
vendor: asus model: zenfone 4 selfie
vendor: asus model: rt-n12d1
vendor: asus model: rt-ac3100
vendor: asus model: rt-n300
vendor: asus model: rt-n66w
vendor: asus model: zenfone 3 max
vendor: asus model: zenfone 3 laser
vendor: asus model: rt-ax86u
vendor: asus model: rt-n10
vendor: asus model: rt_ac1200g
vendor: asus model: dsl-n16u
vendor: asus model: dsl-n10s v2.1.16_apac
vendor: asus model: zenfone 3 ultra
vendor: asus model: dsl-n55u c1
vendor: asus model: asuswrt-merlin
vendor: asus model: dsl-ac56u
vendor: asus model: rt-ac1200
vendor: asus model: dsl-n12u c1
vendor: asus model: asus
vendor: asus model: ikvm
vendor: asus model: rt-n16
vendor: asus model: wrt firmware
vendor: asus model: hg100 firmware
vendor: asus model: dsl-n10_c1
vendor: asus model: rt-ac2900
vendor: asus model: rt-n10e
vendor: asus model: rt-ax56u
vendor: asus model: zenfone
vendor: asus model: rt-n12vp
vendor: asus model: rt-ac56s
vendor: asus model: rt-ac86u
vendor: asus model: as-101
vendor: asus model: wrt firmware 3.0.0.4.376_1071
vendor: asus model: rt-ac1200hp
vendor: asus model: asus asus_x00k_1
vendor: asus model: asus asus_x015_1
vendor: asus model: rt-n
vendor: asus model: zenfone max 4
vendor: asus model: zenfone 5q
vendor: asus model: rt-ac52u
vendor: asus model: zenfone 5 lite
vendor: asus model: aura sync
vendor: asus model: asus wrt-ac66u
vendor: asus model: asus_x00ld_3
vendor: asus model: gt-ac2900
vendor: asus model: rt-ac68w
vendor: asus model: rt-ac53
vendor: asus model: dsl-n14u-b1
vendor: asus model: rt-n66u
vendor: asus model: rt-ac68p
vendor: asus model: rt-n56u wireless router
vendor: asus model: zenfone ar
vendor: asus model: wrt-ac66u
vendor: asus model: ms-101
vendor: asus model: rt-ac1750
vendor: asus model: rt-ac68r
vendor: asus model: gt-ac5300
vendor: asus model: zenfone 3s max
vendor: asus model: dsl-n17u
vendor: asus model: rt-ac56u
vendor: asus model: rt-ac52u b1
vendor: asus model: rt-n65u
vendor: asus model: dsl-ac51
vendor: asus model: rt-ac87u firmware
vendor: asus model: zenfone 5 selfie
db: NVD ids: CVE-2023-47007, CVE-2017-6549, CVE-2011-4497, CVE-2021-3166, CVE-2020-15009, CVE-2021-28202, CVE-2023-29772, CVE-2019-15398, CVE-2021-28189, CVE-2016-6557, CVE-2019-15412, CVE-2021-28207, CVE-2021-3128, CVE-2021-28181, CVE-2021-28176, CVE-2018-18291, CVE-2021-28180, CVE-2022-25597, CVE-2021-45757, CVE-2018-8877, CVE-2021-45756, CVE-2005-3489, CVE-2022-32988, CVE-2021-28196, CVE-2017-12590, CVE-2017-5892, CVE-2014-9583, CVE-2017-8877, CVE-2017-12591, CVE-2022-38393, CVE-2023-31195, CVE-2017-12754, CVE-2021-37910, CVE-2019-15410, CVE-2018-11491, CVE-2009-0656, CVE-2022-26668, CVE-2023-47006, CVE-2019-15408, CVE-2019-15403, CVE-2022-44898, CVE-2019-20082, CVE-2019-15414, CVE-2018-0581, CVE-2017-5891, CVE-2018-15887, CVE-2018-14711, CVE-2022-35401, CVE-2023-41348, CVE-2021-37317, CVE-2019-10709, CVE-2018-8879, CVE-2017-15654, CVE-2023-41349, CVE-2021-28182, CVE-2020-7997, CVE-2023-38031, CVE-2022-38105, CVE-2021-28183, CVE-2021-46247, CVE-2021-46109, CVE-2021-28184, CVE-2013-7293, CVE-2014-2719, CVE-2018-8826, CVE-2015-7790, CVE-2021-28204, CVE-2017-6547, CVE-2021-44158, CVE-2021-37315, CVE-2019-18216, CVE-2020-36109, CVE-2015-7787, CVE-2021-40556, CVE-2022-36438, CVE-2018-18287, CVE-2016-6558, CVE-2023-39239, CVE-2013-5948, CVE-2021-40981, CVE-2023-41345, CVE-2023-39237, CVE-2021-41435, CVE-2019-15404, CVE-2018-8878, CVE-2017-11420, CVE-2019-15396, CVE-2015-1437, CVE-2018-14714, CVE-2018-0583, CVE-2023-34360, CVE-2019-15409, CVE-2023-38033, CVE-2017-5632, CVE-2021-28200, CVE-2017-14699, CVE-2022-25595, CVE-2021-28188, CVE-2021-28197, CVE-2018-14710, CVE-2018-14993, CVE-2014-7269, CVE-2021-28198, CVE-2023-47005, CVE-2022-26672, CVE-2019-15413, CVE-2022-42455, CVE-2023-34940, CVE-2022-26673, CVE-2018-18537, CVE-2017-17944, CVE-2023-34358, CVE-2017-12593, CVE-2009-3093, CVE-2020-10649, CVE-2019-15392, CVE-2022-23973, CVE-2019-15394, CVE-2019-11060, CVE-2023-39780, CVE-2015-2676, CVE-2023-39240, CVE-2023-35087, CVE-2021-28194, CVE-2018-14980, CVE-2019-15395, CVE-2021-3229, CVE-2021-28187, CVE-2018-14992, CVE-2015-7788, CVE-2023-35086, CVE-2022-22054, CVE-2023-26602, CVE-2022-35899, CVE-2021-43702, CVE-2019-15397, CVE-2019-19235, CVE-2017-11344, CVE-2014-10000, CVE-2021-41436, CVE-2019-15393, CVE-2021-28175, CVE-2023-28703, CVE-2022-26669, CVE-2021-28177, CVE-2023-34941, CVE-2023-34942, CVE-2019-15912, CVE-2021-28178, CVE-2022-23971, CVE-2021-28206, CVE-2015-6949, CVE-2018-14979, CVE-2021-28195, CVE-2019-15910, CVE-2021-41289, CVE-2023-39086, CVE-2021-28203, CVE-2014-7270, CVE-2021-28209, CVE-2018-14712, CVE-2013-4659, CVE-2017-15656, CVE-2021-28208, CVE-2018-14713, CVE-2012-4924, CVE-2019-15406, CVE-2021-34174, CVE-2023-41346, CVE-2019-15400, CVE-2013-3610, CVE-2021-28193, CVE-2022-23972, CVE-2023-1079, CVE-2020-35219, CVE-2021-32030, CVE-2020-23648, CVE-2020-15498, CVE-2019-15399, CVE-2012-2619, CVE-2005-3490, CVE-2021-41437, CVE-2022-26674, CVE-2017-6548, CVE-2017-11345, CVE-2021-28191, CVE-2013-4656, CVE-2018-17022, CVE-2017-17945, CVE-2022-31874, CVE-2019-15418, CVE-2021-28190, CVE-2021-3254, CVE-2021-28192, CVE-2009-3091, CVE-2021-28685, CVE-2023-41347, CVE-2018-17020, CVE-2019-15911, CVE-2017-8878, CVE-2018-9285, CVE-2015-7789, CVE-2014-2718, CVE-2017-15655, CVE-2021-26943, CVE-2023-38032, CVE-2022-4221, CVE-2022-21933, CVE-2022-23970, CVE-2019-15411, CVE-2021-28186, CVE-2018-5721, CVE-2018-11492, CVE-2018-0582, CVE-2017-12592, CVE-2021-28185, CVE-2017-14698, CVE-2023-39238, CVE-2023-25012, CVE-2009-3092, CVE-2014-2925, CVE-2021-28199, CVE-2015-2681, CVE-2019-15419, CVE-2023-26911, CVE-2022-36439, CVE-2019-15402, CVE-2008-1491, CVE-2021-28205, CVE-2013-4937, CVE-2013-3093, CVE-2019-15407, CVE-2023-47008, CVE-2018-18536, CVE-2019-15405, CVE-2021-28179, CVE-2018-17023, CVE-2017-15653, CVE-2013-6343, CVE-2019-15401, CVE-2018-17021, CVE-2019-17603, CVE-2021-37316, CVE-2019-15391, CVE-2018-18535, CVE-2018-17127, CVE-2021-28201, CVE-2023-28702, CVE-2020-15499, CVE-2021-28686, CVE-2023-39236, CVE-2023-34359, CVE-2022-25596

Trust: 3.75

Fetched: Jan. 9, 2024, 9:13 a.m., Published: Jan. 5, 2024, 8:30 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: ring model: video doorbells
Related entries in the VARIoT vulnerabilities database: VAR-202010-1014

Trust: 5.25

Fetched: Jan. 9, 2024, 9:07 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, search path vulnerability, information disclosure...
Affected productsExternal IDs
vendor: citrix model: gateway
vendor: cisco model: router
vendor: cisco model: series
db: NVD ids: CVE-2015-0079, CVE-2012-0002, CVE-2002-0864, CVE-2022-22015, CVE-2017-8673, CVE-2012-2526, CVE-2023-20123, CVE-2019-1225, CVE-2001-0540, CVE-2012-0173, CVE-2009-1929, CVE-2002-0863, CVE-2016-0036, CVE-2005-1218, CVE-2020-1466, CVE-2020-0660, CVE-2014-6318, CVE-2020-0609, CVE-2016-0190, CVE-2007-0066, CVE-2019-1224, CVE-2020-16863, CVE-2018-0976, CVE-2019-1108, CVE-2021-41371, CVE-2020-0612, CVE-2021-31186, CVE-2016-0019, CVE-2019-9510, CVE-2015-2472, CVE-2015-2373, CVE-2009-1133, CVE-2019-1326, CVE-2019-1489, CVE-2018-18466, CVE-2019-1223, CVE-2001-0014, CVE-2006-4309, CVE-2001-0663, CVE-2007-2593, CVE-2020-0610, CVE-2019-1453, CVE-2012-0152, CVE-2021-38631, CVE-2015-2473, CVE-2014-0296, CVE-2020-3427, CVE-2011-1968, CVE-2023-36790

Trust: 5.25

Fetched: Jan. 9, 2024, 9:06 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, integer overflow, improper access control...
Affected productsExternal IDs
vendor: ubiquiti model: unifi video
vendor: ubiquiti model: networks unifi
vendor: ubiquiti model: unifi
vendor: ubiquiti model: unifi controller
vendor: ubiquiti model: airvision
vendor: ubiquiti networks model: unifi video
vendor: ubiquiti networks model: networks unifi
vendor: ubiquiti networks model: unifi
vendor: ubiquiti networks model: unifi controller
vendor: ubiquiti networks model: airvision
db: NVD ids: CVE-2020-8145, CVE-2023-38034, CVE-2023-41721, CVE-2013-3572, CVE-2016-7792, CVE-2021-22957, CVE-2020-27888, CVE-2020-8144, CVE-2021-44527, CVE-2019-5430, CVE-2023-24104, CVE-2023-28365, CVE-2020-8157, CVE-2020-8148, CVE-2020-8267, CVE-2014-2225, CVE-2021-33820, CVE-2021-33818, CVE-2021-22944, CVE-2019-5456, CVE-2023-32000, CVE-2019-15595, CVE-2016-6914, CVE-2014-2227, CVE-2023-28361, CVE-2021-44530, CVE-2021-22943, CVE-2023-23912, CVE-2014-2226, CVE-2022-22570, CVE-2020-8146, CVE-2021-22952, CVE-2023-31997, CVE-2023-35085, CVE-2021-22882, CVE-2021-44228, CVE-2020-8213, CVE-2019-9270, CVE-2020-8188, CVE-2018-5264, CVE-2020-24755

Trust: 5.0

Fetched: Jan. 9, 2024, 9:05 a.m., Published: Dec. 20, 2023, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: google model: chrome
vendor: google model: google chrome

Trust: 3.0

Fetched: Jan. 9, 2024, 9:05 a.m., Published: Jan. 24, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916, CVE-2023-50196