VARIoT news about IoT security

Trust: 6.25

Fetched: Jan. 5, 2024, 10:16 a.m., Published: Jan. 4, 2024, 10:41 p.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: apple model: macos
db: NVD ids: CVE-2023-41974

Trust: 3.25

Fetched: Jan. 5, 2024, 10:15 a.m., Published: Jan. 3, 2024, 10:24 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: check point model: check point

Trust: 3.5

Fetched: Jan. 5, 2024, 10:14 a.m., Published: Nov. 28, 2023, 9:52 a.m.
Vulnerabilities: cross-site scripting, sql injection, account lockout...
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202401-0655

Trust: 4.75

Fetched: Jan. 5, 2024, 10:14 a.m., Published: Jan. 3, 2024, 10:47 p.m.
Vulnerabilities: memory corruption, buffer overflow, code execution...
Affected productsExternal IDs
db: NVD ids: CVE-2023-33030, CVE-2023-33025, CVE-2023-33032

Trust: 4.25

Fetched: Jan. 5, 2024, 9:52 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: directory traversal, information disclosure, denial of service...
Affected productsExternal IDs
vendor: apple model: mac os
vendor: apple model: mac os x
vendor: apple model: apple mac os x
vendor: dropbear model: ssh server
vendor: zoho model: manageengine servicedesk plus
vendor: typo3 model: typo3
vendor: citrix model: gateway
vendor: citrix model: sd-wan
vendor: meinberg model: lantime m300
vendor: meinberg model: lantime
vendor: peplink model: 2500
vendor: peplink model: balance
vendor: peplink model: balance 305
vendor: proftpd model: proftpd
vendor: moxa model: thingspro
vendor: mailsite model: rockliffe
vendor: cisco model: cisco ios xr
vendor: cisco model: cisco sd-wan
vendor: cisco model: webex meetings server
vendor: cisco model: webex meetings
vendor: cisco model: series
vendor: cisco model: webex support center
vendor: cisco model: meeting
vendor: cisco model: cisco webex
vendor: cisco model: webex meeting server
vendor: cisco model: cisco ios
vendor: cisco model: cisco webex meetings server
vendor: cisco model: cisco unified communications domain manager
vendor: cisco model: meeting server
vendor: cisco model: ios xr
vendor: cisco model: cisco unified communications manager
vendor: cisco model: webex event center
vendor: cisco model: cisco webex support center
vendor: cisco model: meetings server
vendor: cisco model: sd-wan vmanage software
vendor: cisco model: sd-wan
vendor: cisco model: unified communications
vendor: cisco model: cisco webex training center
vendor: cisco model: cisco connected mobile experiences
vendor: cisco model: cisco webex meetings
vendor: cisco model: unified communications domain manager
vendor: cisco model: webex
vendor: cisco model: ios xr software
vendor: cisco model: cisco webex event center
vendor: cisco model: cisco webex meeting center
vendor: cisco model: sd-wan vmanage
vendor: cisco model: umbrella
vendor: cisco model: unified communications manager
vendor: cisco model: webex training center
vendor: cisco model: webex meeting center
vendor: cisco model: connected mobile experiences
vendor: aviatrix model: gateway
vendor: aviatrix model: controller
vendor: watchguard model: watchguard fireware
vendor: watchguard model: firebox
vendor: watchguard model: fireware
vendor: rockliffe model: mailsite
vendor: zabbix model: zabbix
db: NVD ids: CVE-2019-14351, CVE-2022-2939, CVE-2003-0343, CVE-2023-22359, CVE-2022-41697, CVE-2022-34623, CVE-2009-0167, CVE-2006-0129, CVE-2021-40126, CVE-2012-5615, CVE-2020-27199, CVE-2020-26034, CVE-2003-0342, CVE-2022-2416, CVE-2022-39314, CVE-2021-22003, CVE-2014-3278, CVE-2021-1486, CVE-2014-3286, CVE-2020-7918, CVE-2020-1717, CVE-2006-2247, CVE-2021-43194, CVE-2022-40292, CVE-2019-19677, CVE-2007-2768, CVE-2022-38755, CVE-2022-24633, CVE-2023-3221, CVE-2004-1697, CVE-2021-46434, CVE-2022-40895, CVE-2020-24008, CVE-2023-36127, CVE-2020-9389, CVE-2023-31186, CVE-1999-0990, CVE-2021-36721, CVE-2022-23342, CVE-2018-20170, CVE-2010-3195, CVE-2023-40761, CVE-2023-3897, CVE-2021-37151, CVE-2023-43623, CVE-2019-15987, CVE-2016-20012, CVE-2015-0597, CVE-2004-1602, CVE-2017-8835, CVE-2023-26071, CVE-2023-23838, CVE-2023-38357, CVE-2021-29621, CVE-2001-1483, CVE-2019-3990, CVE-2014-8034, CVE-2023-34261, CVE-2021-41634, CVE-2023-50858, CVE-2020-6371, CVE-2020-13413, CVE-2019-6122, CVE-2014-8035, CVE-2020-28206, CVE-2021-44876, CVE-2019-15132, CVE-2018-15473, CVE-2023-40758, CVE-2014-9247, CVE-2022-22702, CVE-2023-30458, CVE-2018-13361, CVE-2023-40760, CVE-2021-1143, CVE-2022-39315, CVE-2018-15919, CVE-2006-0130, CVE-2019-7217, CVE-2022-2827, CVE-2023-38871, CVE-2015-4845, CVE-2009-0142, CVE-2016-1410, CVE-2021-39125, CVE-2014-3279, CVE-2023-3336, CVE-2022-3880, CVE-2000-0089, CVE-2019-15045, CVE-2023-33562, CVE-2023-36135, CVE-2018-5682, CVE-2005-1133, CVE-2018-1000126, CVE-2023-3462, CVE-2017-18536, CVE-2023-40764, CVE-2020-7240, CVE-2023-49274, CVE-2013-6182, CVE-2020-35614, CVE-2023-25192, CVE-2018-10210, CVE-2020-28185, CVE-2007-0310, CVE-2020-15392, CVE-2018-15599, CVE-2018-18602, CVE-2016-6210, CVE-2022-24032, CVE-2009-0580, CVE-2023-40765, CVE-2016-4158, CVE-2014-4156, CVE-2016-20003, CVE-2018-18390, CVE-2021-4191, CVE-2019-4068, CVE-2023-40766, CVE-2023-4095, CVE-2020-4244, CVE-2019-0405, CVE-2022-40482, CVE-2016-1542, CVE-2021-41239, CVE-2022-21659, CVE-2023-40763, CVE-2020-35177, CVE-2020-7962, CVE-2015-4194, CVE-2003-0402, CVE-2023-40757, CVE-2017-8055, CVE-2023-40767, CVE-2017-1000226, CVE-2023-48028, CVE-2023-46237, CVE-2019-16516, CVE-2023-28015, CVE-2021-44875, CVE-2021-22257, CVE-2020-11576, CVE-2023-40759, CVE-2019-6120, CVE-2023-40756, CVE-2023-36141, CVE-2021-39118, CVE-2005-2591, CVE-2020-11063, CVE-2021-31159, CVE-2013-0513, CVE-2014-4634, CVE-2022-37146, CVE-2019-1842, CVE-2014-8000, CVE-2023-40762, CVE-2007-2243, CVE-2023-47102

Trust: 3.5

Fetched: Jan. 5, 2024, 9:44 a.m., Published: Oct. 26, 2023, 4:35 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: mac os
vendor: apple model: macos
vendor: palo model: networks
vendor: tripwire model: ip360
db: NVD ids: CVE-2023-27350

Trust: 5.75

Fetched: Jan. 5, 2024, 9:36 a.m., Published: Dec. 22, 2023, midnight
Vulnerabilities: buffer overflow
Affected productsExternal IDs
vendor: google model: chrome
vendor: google model: android
db: NVD ids: CVE-2023-7024

Trust: 5.5

Fetched: Jan. 5, 2024, 9:35 a.m., Published: Dec. 8, 2023, 1:38 p.m.
Vulnerabilities: code execution, authentication vulnerability
Affected productsExternal IDs
db: NVD ids: CVE-2023-6248
Related entries in the VARIoT vulnerabilities database: VAR-202302-0195, VAR-202302-0482

Trust: 4.5

Fetched: Jan. 5, 2024, 9:34 a.m., Published: Jan. 5, 2024, 7:03 a.m.
Vulnerabilities: buffer overflow, code execution
Affected productsExternal IDs
vendor: wibu-systems model: codemeter runtime
vendor: wibu-systems model: codemeter
vendor: rockwell model: factorytalk activation
vendor: rockwell model: factorytalk
vendor: rockwell model: automation factorytalk
vendor: rockwell automation model: factorytalk activation
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: automation factorytalk
vendor: unitronics model: visilogic
vendor: wibu model: codemeter runtime
vendor: wibu model: codemeter
db: NVD ids: CVE-2023-38433, CVE-2023-0286, CVE-2023-39227, CVE-2023-6448, CVE-2022-4450, CVE-2022-4304
Related entries in the VARIoT vulnerabilities database: VAR-202009-0966, VAR-201111-0159, VAR-201809-0833, VAR-201705-3472, VAR-201809-0826, VAR-201809-0078, VAR-202102-0253, VAR-200505-0406, VAR-202007-0051, VAR-201504-0446, VAR-201809-0830, VAR-202001-1149, VAR-202210-1393, VAR-200705-0515, VAR-202010-0833, VAR-201508-0611, VAR-200708-0456, VAR-201809-0829, VAR-201111-0180, VAR-201111-0161, VAR-202002-1033, VAR-201809-0832, VAR-200607-0083, VAR-202111-0632, VAR-202203-1296, VAR-201907-1074, VAR-201809-0825, VAR-202112-2346, VAR-201912-1012, VAR-201906-0836, VAR-201809-0828, VAR-201906-0838, VAR-202007-0050, VAR-201111-0158, VAR-201907-0797, VAR-201502-0470, VAR-200610-0309, VAR-202210-1390, VAR-200605-0265, VAR-201805-0956, VAR-201111-0162, VAR-200607-0199, VAR-200708-0460, VAR-202011-0712, VAR-201910-0685, VAR-201111-0160, VAR-201301-0243, VAR-202210-1391, VAR-201808-0267, VAR-202007-0674, VAR-201507-0461, VAR-201906-0835, VAR-201809-0831, VAR-201809-0827, VAR-202101-1853, VAR-201812-0377, VAR-201309-0168, VAR-202006-0391, VAR-201809-0824, VAR-201809-0823, VAR-201807-1344, VAR-201707-1306, VAR-202210-1392, VAR-201901-0839, VAR-201111-0178, VAR-201809-0820, VAR-201707-1044, VAR-201906-0771, VAR-202301-0652, VAR-200605-0268, VAR-201307-0443, VAR-200705-0518, VAR-202108-0848, VAR-201809-0834, VAR-201809-0822, VAR-201111-0179, VAR-200605-0266, VAR-201906-0587, VAR-201707-1045, VAR-202104-1074, VAR-201906-0839, VAR-201411-0177, VAR-202001-0840, VAR-202104-1463, VAR-201809-0821, VAR-200605-0267

Trust: 5.25

Fetched: Jan. 5, 2024, 9:31 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: cross-site scripting, directory traversal, information disclosure...
Affected productsExternal IDs
vendor: securifi model: almond 2015
vendor: securifi model: almond
vendor: securifi model: securifi almond
vendor: apple model: mdnsresponder
vendor: apple model: mac os
vendor: apple model: mac os x
vendor: apple model: apple mac os x
vendor: edimax model: plug
vendor: edimax model: br-6104k router
vendor: edimax model: br-6104k
vendor: edimax model: 6114wg
vendor: sonos model: sonos
vendor: sonos model: connect
vendor: canyon model: cn-wf512
vendor: canyon model: cn-wf514
vendor: green packet model: green packet dx-350 firmware
vendor: green packet model: dx-350
vendor: green packet model: green packet dx-350
vendor: linksys model: wrt54gl
vendor: linksys model: wrt54gx
vendor: linksys model: wrt54g
vendor: linksys model: wrt54gs
vendor: thomson model: speedtouch
vendor: zyxel model: p-330w
vendor: zyxel model: p-335wt router
vendor: compal model: networks
vendor: compal model: cg6640e wireless gateway
vendor: abode model: gateway
vendor: tp-link model: tl-wr886n
vendor: tp-link model: gateway
vendor: tp-link model: routers
vendor: mercusys model: mercury x18g
vendor: belkin model: belkin wemo switch
vendor: belkin model: wireless g router
vendor: belkin model: wemo switch 28b
vendor: belkin model: wemo switch
vendor: belkin model: n750
vendor: belkin model: n900
vendor: belkin model: wemo switch 28b ww_2.00.11057.pvt-owrt-sns
vendor: belkin model: router
vendor: swisscom model: internet-box light
vendor: compal broadband networks model: networks
vendor: compal broadband networks model: cg6640e wireless gateway
vendor: hospira model: lifecare pca infusion system
vendor: green model: packet dx-350
vendor: netgear model: r7800
vendor: netgear model: r6400v2
vendor: netgear model: xr450
vendor: netgear model: wndr3400v3
vendor: netgear model: r6700 v1.0.4.84_10.0.58
vendor: netgear model: r8900
vendor: netgear model: wn3000rpv2
vendor: netgear model: lbr20
vendor: netgear model: wn3000rpv3
vendor: netgear model: xr700
vendor: netgear model: xr500
vendor: netgear model: ex2700
vendor: netgear model: r9000
vendor: netgear model: d7800
vendor: netgear model: r6700
vendor: netgear model: router
vendor: netgear model: netgear r6700 v1.0.4.84_10.0.58
vendor: d-link model: tesco dcs-2121 1.05_tesco
vendor: d-link model: dcs-2121
vendor: d-link model: di-784
vendor: d-link model: di-604 broadband router
vendor: d-link model: dir-802
vendor: d-link model: dcs-1130
vendor: d-link model: dir-816l
vendor: d-link model: dcs-1100
vendor: d-link model: dsr-1000n
vendor: d-link model: di-604
vendor: d-link model: dir-859
vendor: d-link model: dcs-2121 1.06_fr
vendor: d-link model: ebr-2310 ethernet broadband router
vendor: d-link model: dsr-250
vendor: d-link model: dir-615
vendor: d-link model: tesco dcs-2102 1.05_tesco
vendor: d-link model: wbr-1310
vendor: d-link model: di-524
vendor: d-link model: router
vendor: d-link model: ethernet broadband router
vendor: d-link model: dsl-g624t
vendor: d-link model: wbr-1310 wireless g router
vendor: d-link model: wbr-2310 rangebooster g router
vendor: d-link model: di-624
vendor: d-link model: wbr-2310
vendor: d-link model: dcs-2102 1.06_fr
vendor: d-link model: dcs-2102
vendor: foscam model: thomson
vendor: foscam model: system
vendor: foscam model: c1 indoor hd camera
vendor: dahua model: camera
vendor: genexis model: platinum 4410
vendor: genexis model: platinum
vendor: terramaster model: f2-210
vendor: synology model: dns server
vendor: technicolor model: tg585 firmware
vendor: technicolor model: tg585
vendor: wrt54g model: linksys
vendor: broadcom model: broadcom linux
vendor: broadcom model: linux
vendor: cisco model: rv130w
vendor: cisco model: dpc3939
vendor: cisco model: series
vendor: cisco model: cvr100w
vendor: cisco model: rv215w
vendor: cisco model: rv130
vendor: cisco model: cisco cvr100w wireless-n vpn router
vendor: cisco model: rv110w
vendor: cisco model: linksys wrt54gx
vendor: cisco model: linksys
vendor: cisco model: router
vendor: cisco model: wrt54gl
vendor: cisco model: 1100
vendor: cisco model: cvr100w wireless-n vpn router
vendor: cisco model: small business
vendor: cisco model: wrt54gx
vendor: cisco model: cisco small business
vendor: cisco model: linksys wrt54g
vendor: cisco model: wrt54g
vendor: cisco model: routers
vendor: cisco model: wrt54gs
vendor: canyon-tech model: cn-wf512
vendor: canyon-tech model: cn-wf514
vendor: micasaverde model: veraedge
vendor: micasaverde model: veralite firmware
vendor: micasaverde model: veralite
vendor: abode systems model: gateway
vendor: siemens model: speedstream wireless router
vendor: siemens model: speedstream
vendor: vera model: veraedge
vendor: vera model: veralite firmware
vendor: vera model: veralite
vendor: sweex model: lb000021
vendor: freebox model: server
vendor: freebox model: freebox server
vendor: sitecom model: wl-153 router firmware
vendor: sitecom model: wl-111
vendor: sitecom model: wl-153 router
vendor: sitecom model: wl-153
db: NVD ids: CVE-2020-24373, CVE-2021-35393, CVE-2021-31718, CVE-2011-4503, CVE-2020-23622, CVE-2018-17017, CVE-2012-5962, CVE-2021-33516, CVE-2017-3882, CVE-2018-17010, CVE-2023-31998, CVE-2013-0229, CVE-2017-2879, CVE-2018-11946, CVE-2008-1654, CVE-2020-18568, CVE-2005-0833, CVE-2023-27217, CVE-2020-10924, CVE-2012-5961, CVE-2015-3459, CVE-2018-17014, CVE-2013-4863, CVE-2012-5965, CVE-2022-35879, CVE-2007-2386, CVE-2020-24375, CVE-2013-1462, CVE-2015-2984, CVE-2021-26899, CVE-2009-2174, CVE-2019-12107, CVE-2007-3744, CVE-2018-17013, CVE-2005-2120, CVE-2011-4501, CVE-2011-4505, CVE-2013-0274, CVE-2020-5524, CVE-2018-13415, CVE-2018-17016, CVE-2005-3644, CVE-2006-3344, CVE-2021-34991, CVE-2022-26997, CVE-2012-5963, CVE-2017-8414, CVE-2018-17009, CVE-2021-45603, CVE-2001-0876, CVE-2019-17621, CVE-2017-9392, CVE-2018-17012, CVE-2017-9382, CVE-2020-10923, CVE-2011-4502, CVE-2001-0877, CVE-2019-14363, CVE-2016-5301, CVE-2015-0869, CVE-2021-29462, CVE-2020-24376, CVE-2006-5537, CVE-2016-8863, CVE-2022-35878, CVE-2011-1165, CVE-2006-0023, CVE-2006-2559, CVE-2018-8914, CVE-2020-1598, CVE-2018-15506, CVE-2020-28926, CVE-2018-13416, CVE-2011-4506, CVE-2006-3687, CVE-2007-3748, CVE-2006-6296, CVE-2020-25988, CVE-2019-17532, CVE-2011-4504, CVE-2013-0230, CVE-2022-35881, CVE-2018-15875, CVE-2023-45576, CVE-2018-13417, CVE-2012-5959, CVE-2021-35392, CVE-2020-15893, CVE-2012-5958, CVE-2014-5406, CVE-2017-9391, CVE-2018-17015, CVE-2018-17011, CVE-2020-1430, CVE-2019-16903, CVE-2021-23242, CVE-2020-13848, CVE-2012-5960, CVE-2018-16596, CVE-2013-3613, CVE-2020-12695, CVE-2020-0781, CVE-2019-1405, CVE-2018-17008, CVE-2018-17007, CVE-2020-1354, CVE-2018-11316, CVE-2015-6031, CVE-2008-2957, CVE-2017-9930, CVE-2007-1204, CVE-2020-19858, CVE-2022-35880, CVE-2018-16195, CVE-2011-4499, CVE-2016-6255, CVE-2018-17004, CVE-2017-9479, CVE-2017-8330, CVE-2022-43972, CVE-2022-47848, CVE-2013-1461, CVE-2006-2562, CVE-2020-0783, CVE-2013-5006, CVE-2015-4141, CVE-2007-2390, CVE-2020-1519, CVE-2021-34730, CVE-2001-0721, CVE-2012-5964, CVE-2007-0357, CVE-2018-17018, CVE-2018-17006, CVE-2011-4500, CVE-2006-2560, CVE-2019-12780, CVE-2017-9480, CVE-2021-30127, CVE-2017-9383, CVE-2014-8654, CVE-2013-1600, CVE-2021-29379, CVE-2020-1538, CVE-2018-17005, CVE-2006-2561

Trust: 5.25

Fetched: Jan. 5, 2024, 9:29 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: cross-site scripting, session hijacking, information disclosure...
Affected productsExternal IDs
vendor: fuji model: xerox phaser
vendor: fujifilm model: apeosport-vi
vendor: fujifilm model: docucentre-vi
vendor: xerox corporation model: atlalink
vendor: xerox corporation model: colorqube
vendor: xerox corporation model: workcentre pro
vendor: xerox corporation model: workcentre pro color
vendor: xerox corporation model: workcentre
vendor: xerox corporation model: phaser
vendor: xerox corporation model: phaser 3320
vendor: xerox corporation model: altalink b8045
vendor: xerox corporation model: color
vendor: xerox corporation model: altalink c8035
vendor: xerox corporation model: altalink c8030
vendor: xerox corporation model: colorqube 8580
vendor: xerox model: atlalink
vendor: xerox model: colorqube
vendor: xerox model: workcentre pro
vendor: xerox model: workcentre pro color
vendor: xerox model: workcentre
vendor: xerox model: phaser
vendor: xerox model: phaser 3320
vendor: xerox model: altalink b8045
vendor: xerox model: color
vendor: xerox model: altalink c8035
vendor: xerox model: altalink c8030
vendor: xerox model: colorqube 8580
db: NVD ids: CVE-2018-20768, CVE-2023-46327, CVE-2008-2825, CVE-2006-6440, CVE-2006-1137, CVE-2006-6437, CVE-2020-26162, CVE-2006-6433, CVE-2008-5225, CVE-2010-0549, CVE-2001-1134, CVE-2002-1834, CVE-2018-20771, CVE-2009-3913, CVE-2022-26572, CVE-2006-6438, CVE-2008-3122, CVE-2006-6468, CVE-2002-1835, CVE-2019-17184, CVE-2008-6436, CVE-2006-6472, CVE-2019-13165, CVE-2006-6469, CVE-2006-6441, CVE-2006-6435, CVE-2006-6436, CVE-1999-1343, CVE-2021-28669, CVE-2016-11061, CVE-2006-6430, CVE-2021-28672, CVE-2006-0825, CVE-2005-2647, CVE-2008-3571, CVE-2005-1179, CVE-2018-15530, CVE-2019-18629, CVE-2006-6431, CVE-2021-37354, CVE-2019-16307, CVE-2005-2645, CVE-2019-10880, CVE-2019-18628, CVE-2008-3121, CVE-2006-6432, CVE-2019-13166, CVE-2021-28670, CVE-2005-1936, CVE-2006-6470, CVE-2005-2202, CVE-2006-0828, CVE-2022-45897, CVE-2019-13168, CVE-2019-18630, CVE-2001-0484, CVE-2021-28671, CVE-2006-6439, CVE-2006-1138, CVE-2008-2743, CVE-2022-26320, CVE-2022-23968, CVE-2021-28668, CVE-2019-13172, CVE-2005-2646, CVE-2020-36201, CVE-2018-20770, CVE-2021-28673, CVE-2019-19832, CVE-2006-6473, CVE-2006-6428, CVE-2019-13170, CVE-2018-16709, CVE-2010-0548, CVE-2006-1139, CVE-2006-1136, CVE-2006-5290, CVE-2005-2201, CVE-2018-17172, CVE-2019-13167, CVE-2006-6434, CVE-2005-2200, CVE-2005-0703, CVE-2006-0827, CVE-2020-9330, CVE-2019-13169, CVE-2006-6467, CVE-2002-1833, CVE-2006-2113, CVE-2009-1656, CVE-2006-6427, CVE-2018-20767, CVE-2018-20769, CVE-2019-10881, CVE-2013-6362, CVE-2019-13171, CVE-2006-0826, CVE-2002-1836, CVE-2006-2112, CVE-2006-6471, CVE-2014-3138, CVE-2004-0342, CVE-2008-2824, CVE-2006-6429, CVE-2021-20679
Related entries in the VARIoT vulnerabilities database: VAR-202301-1763, VAR-200711-0144, VAR-202109-0238, VAR-200504-0002, VAR-200005-0103, VAR-201601-0587, VAR-202301-1767, VAR-200110-0033, VAR-202306-1186, VAR-202003-1187, VAR-202110-1353, VAR-200802-0041, VAR-201906-0783, VAR-201205-0020, VAR-200212-0790, VAR-201609-0026, VAR-201605-0407, VAR-201706-0237, VAR-202301-1748, VAR-200908-0248, VAR-200412-1123, VAR-200404-0081, VAR-200107-0174, VAR-201508-0286, VAR-200412-1122, VAR-199708-0008, VAR-201910-1495, VAR-201404-0044, VAR-201906-0412, VAR-200903-0277, VAR-201309-0022, VAR-201503-0118, VAR-201310-0534, VAR-200701-0442, VAR-200110-0031, VAR-200505-0928, VAR-201110-0152, VAR-201012-0005, VAR-202304-0151, VAR-200305-0026, VAR-200112-0062, VAR-201110-0245, VAR-201404-0581, VAR-201710-0242, VAR-201504-0119, VAR-201410-0969, VAR-200102-0029, VAR-201004-0454, VAR-200412-0194, VAR-201610-0302, VAR-200504-0003, VAR-201602-0220, VAR-201310-0526, VAR-201906-0787, VAR-201605-0554, VAR-200005-0062, VAR-200412-1124, VAR-200906-0086, VAR-201207-0137, VAR-201107-0083, VAR-201607-0426, VAR-201310-0525, VAR-199907-0022, VAR-202301-1769, VAR-201106-0229, VAR-201712-0854, VAR-202205-0355, VAR-202108-0211, VAR-199912-0159, VAR-200501-0255, VAR-200011-0030, VAR-200711-0145, VAR-201202-0095, VAR-201905-0598, VAR-200901-0056, VAR-200505-0908, VAR-201704-1214, VAR-200205-0034, VAR-201105-0030, VAR-200007-0058, VAR-201812-0066, VAR-200312-0365, VAR-202301-1022, VAR-200212-0524, VAR-202111-1611, VAR-201308-0212, VAR-200106-0167, VAR-200704-0593, VAR-201311-0232, VAR-202111-1613, VAR-201606-0391, VAR-201705-3294

Trust: 5.25

Fetched: Jan. 5, 2024, 9:20 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: arbitrary command execution, process crash, information disclosure...
Affected productsExternal IDs
vendor: mikrotik model: routers
vendor: mikrotik model: router
vendor: apple model: apple tv
vendor: apple model: airport express
vendor: apple model: time capsule
vendor: apple model: cups
vendor: apple model: iphone
vendor: apple model: iphone os
vendor: apple model: airport extreme base station
vendor: apple model: airport extreme
vendor: apple model: airport express base station
vendor: apple model: ipod touch
vendor: ingate model: ingate firewall
vendor: ingate model: firewall
vendor: ingate model: siparator
vendor: beckhoff model: twincat
vendor: forescout model: counteract
vendor: forescout model: forescout counteract
vendor: tiny model: personal firewall
vendor: zyxel model: prestige
vendor: zyxel model: prestige 642r
vendor: tp-link model: wr940n
vendor: tp-link model: tl-wr940n
vendor: tp-link model: gateway
vendor: tp-link model: routers
vendor: wireshark model: wireshark
vendor: kerio model: personal firewall
vendor: snort model: snort
vendor: huawei model: smart phones
vendor: huawei model: nova
vendor: huawei model: huawei
vendor: huawei model: honor
vendor: contiki-ng model: contiki
vendor: contiki-ng model: contiki-ng
vendor: nokia model: series
vendor: nokia model: impact
vendor: cayman model: 3220-h dsl router
vendor: squid model: squid
vendor: d-link model: dcs-825l
vendor: d-link model: router
vendor: check point model: security gateway
vendor: check point model: vpn-1
vendor: check point model: check point vpn
vendor: check point model: express
vendor: check point model: management server
vendor: check point model: check point
vendor: moxa model: awk-3121
vendor: cups model: cups
vendor: prestige model: zyxel
vendor: cisco model: telepresence
vendor: cisco model: unified ip phone
vendor: cisco model: cisco ios xr
vendor: cisco model: technical support
vendor: cisco model: cisco ios xe
vendor: cisco model: ons 15327
vendor: cisco model: series
vendor: cisco model: cisco unified callmanager
vendor: cisco model: ios xr
vendor: cisco model: ios 12.2
vendor: cisco model: vpn 3000 series
vendor: cisco model: guard
vendor: cisco model: fwsm
vendor: cisco model: wireless lan controller
vendor: cisco model: ip phone
vendor: cisco model: ios xe software
vendor: cisco model: 1000v
vendor: cisco model: cisco ons
vendor: cisco model: telepresence sx quick set series
vendor: cisco model: unified callmanager
vendor: cisco model: nx-os software
vendor: cisco model: nx-os 4.2
vendor: cisco model: nexus 5000
vendor: cisco model: ons 15454
vendor: cisco model: firepower threat defense
vendor: cisco model: firepower 4110
vendor: cisco model: cisco unified ip phone
vendor: cisco model: cisco ios
vendor: cisco model: nexus 1000v
vendor: cisco model: unified presence
vendor: cisco model: ios 12.0
vendor: cisco model: asr 1000
vendor: cisco model: nexus 9000
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: ios 12.3
vendor: cisco model: series switch
vendor: cisco model: cisco wireless lan controller
vendor: cisco model: ios xr software
vendor: cisco model: nx-os 4.2.
vendor: cisco model: packet data network gateway
vendor: cisco model: series routers
vendor: cisco model: vpn 3002 hardware client
vendor: cisco model: ios 11.2
vendor: cisco model: cisco unified presence
vendor: cisco model: nx-os
vendor: cisco model: telepresence mx series
vendor: cisco model: cisco unified presence server
vendor: cisco model: telepresence collaboration endpoint
vendor: cisco model: ios xe
vendor: cisco model: firewall services module
vendor: cisco model: cbos
vendor: cisco model: series switches
vendor: cisco model: catalyst
vendor: cisco model: cisco telepresence
vendor: cisco model: routers
vendor: cisco model: cisco vpn 3000 series
vendor: cisco model: nexus 7000
vendor: cisco model: spark
vendor: cisco model: firepower
vendor: cisco model: adaptive security appliance
vendor: cisco model: spark room os
vendor: cisco model: telepresence dx series
vendor: cisco model: catalyst 6500
vendor: cisco model: secure desktop
vendor: cisco model: cisco nx-os
vendor: cisco model: router
vendor: cisco model: telepresence endpoint
vendor: cisco model: content services gateway
vendor: cisco model: industrial ethernet
vendor: cisco model: telepresence sx series
vendor: cisco model: unified presence server
vendor: cisco model: ip phone 7940
vendor: cisco model: nexus
vendor: phoenix model: contact fl switch
vendor: watchguard model: firebox
vendor: siemens model: pxc200-e.d
vendor: siemens model: scalance s615
vendor: siemens model: pxc22.1-e.d
vendor: siemens model: pxc100-e.d
vendor: siemens model: scalance w1750d
vendor: siemens model: apogee pxc
vendor: siemens model: simatic s7-400 pn
vendor: siemens model: simotics connect
vendor: siemens model: simatic s7-400
vendor: siemens model: nucleus
vendor: siemens model: apogee mec
vendor: siemens model: reliant unix
vendor: siemens model: vstar
vendor: siemens model: ruggedcom rm1224
vendor: siemens model: pxc001-e.d
vendor: siemens model: talon tc
vendor: siemens model: w1750d
vendor: siemens model: scalance sc-600
vendor: siemens model: desigo pxm20
vendor: siemens model: talon tc compact
vendor: siemens model: talon tc modular
vendor: siemens model: pxm20-e
vendor: siemens model: pxc50-e.d
vendor: siemens model: simatic net cp 1243-1
vendor: siemens model: pxc36.1-e.d
vendor: siemens model: pxc128-u
vendor: siemens model: nucleus net
vendor: siemens model: nucleus readystart
vendor: siemens model: pxc00-u
vendor: siemens model: simatic mv500
vendor: siemens model: simatic
vendor: siemens model: apogee pxc modular
vendor: siemens model: s7-400
vendor: siemens model: apogee pxc compact
vendor: siemens model: pxc00-e.d
vendor: siemens model: simatic net
vendor: siemens model: ruggedcom
vendor: siemens model: scalance
vendor: siemens model: nucleus source code
vendor: siemens model: simotics connect 400
vendor: siemens model: pxc64-u
vendor: siemens model: simatic cloud connect 7
vendor: siemens model: scalance m-800
vendor: siemens model: apogee mbc
vendor: contiki model: contiki-ng
db: NVD ids: CVE-2022-41002, CVE-2002-0208, CVE-2023-40709, CVE-2011-1385, CVE-2007-6097, CVE-2014-7142, CVE-2010-4526, CVE-2016-3947, CVE-2021-1625, CVE-2009-0778, CVE-2004-0790, CVE-1999-0875, CVE-1999-0214, CVE-2000-0451, CVE-2001-1387, CVE-2023-41355, CVE-2015-7759, CVE-2012-2654, CVE-2023-49062, CVE-2005-3810, CVE-2022-40996, CVE-2001-0754, CVE-2023-41354, CVE-2023-34101, CVE-2020-3190, CVE-2021-40114, CVE-2008-0526, CVE-2018-10693, CVE-2004-0819, CVE-2011-4012, CVE-2002-2315, CVE-2016-1277, CVE-2016-1399, CVE-2002-0046, CVE-2015-3913, CVE-2021-20322, CVE-2022-41001, CVE-2009-0638, CVE-2005-0067, CVE-2004-1060, CVE-2001-0384, CVE-2011-1927, CVE-2015-5058, CVE-2005-0066, CVE-2002-0704, CVE-1999-0524, CVE-2018-14462, CVE-2002-0574, CVE-1999-0523, CVE-2019-5598, CVE-2012-5723, CVE-2015-3636, CVE-2012-0194, CVE-2013-0343, CVE-2019-6989, CVE-2009-0634, CVE-2006-0414, CVE-2023-22411, CVE-2009-2487, CVE-1999-0345, CVE-1999-0128, CVE-2011-2391, CVE-2015-0638, CVE-2013-5507, CVE-1999-0265, CVE-2007-0480, CVE-1999-0454, CVE-2001-0752, CVE-2005-3848, CVE-2005-0065, CVE-2011-2059, CVE-2009-2189, CVE-2023-20051, CVE-2023-23415, CVE-2003-0260, CVE-2001-0861, CVE-2011-3270, CVE-2001-0592, CVE-2014-4702, CVE-2014-2144, CVE-2010-0239, CVE-2006-4833, CVE-1999-1254, CVE-2017-10610, CVE-2020-12494, CVE-2017-13012, CVE-2011-4604, CVE-2015-1103, CVE-2021-33011, CVE-2014-6377, CVE-2019-10639, CVE-2001-0057, CVE-2014-4701, CVE-2007-4213, CVE-2016-3707, CVE-2010-1612, CVE-2007-0066, CVE-2023-48692, CVE-2006-0054, CVE-2004-1432, CVE-2020-10756, CVE-2016-6378, CVE-2004-0791, CVE-2015-6398, CVE-2013-5543, CVE-2018-10697, CVE-2002-0115, CVE-1999-0513, CVE-2020-25705, CVE-1999-1228, CVE-2021-21003, CVE-2008-1095, CVE-2016-1379, CVE-2011-1871, CVE-2014-8533, CVE-2018-17156, CVE-2000-0418, CVE-2016-10142, CVE-1999-1201, CVE-2022-25667, CVE-2007-6211, CVE-2005-0068, CVE-2006-6893, CVE-1999-1157, CVE-2009-1683, CVE-2012-3016, CVE-2010-0241, CVE-2020-3571, CVE-2011-2064, CVE-2013-3183, CVE-2006-4265, CVE-2016-1445, CVE-2007-0634, CVE-2014-0100, CVE-2013-5542, CVE-2003-0418, CVE-1999-0683, CVE-2021-32019, CVE-2009-3641, CVE-1999-1563, CVE-2018-2710, CVE-2006-0454, CVE-2022-40995, CVE-2012-2394, CVE-2011-2395, CVE-2017-17538, CVE-2017-2671, CVE-2022-26071, CVE-2022-45434, CVE-2020-35683, CVE-2000-0041, CVE-2012-4985, CVE-2004-1109, CVE-2000-0882, CVE-2007-6098, CVE-2012-0352, CVE-2001-0323, CVE-2000-0568, CVE-2019-1832, CVE-2008-5849, CVE-2005-0039, CVE-2006-1651, CVE-2017-3470, CVE-1999-0804, CVE-2002-0237, CVE-2007-0343, CVE-2014-7141, CVE-2016-9919, CVE-2021-1229, CVE-2011-1613, CVE-2000-0619, CVE-2018-18442, CVE-2003-0293, CVE-2003-1398, CVE-2023-22391, CVE-2002-1925, CVE-2021-31346, CVE-2013-3464, CVE-2017-12895, CVE-2002-1072, CVE-2002-0630, CVE-2018-16527, CVE-2014-2284, CVE-2001-0411, CVE-2007-1834, CVE-2013-6694, CVE-2021-31344, CVE-2023-47093, CVE-2023-28974, CVE-2013-3182, CVE-2019-10638, CVE-2016-4429, CVE-2017-3825

Trust: 4.25

Fetched: Jan. 5, 2024, 9:19 a.m., Published: Dec. 28, 2023, 9:04 p.m.
Vulnerabilities: privilege escalation, code execution, integer overflow
Affected productsExternal IDs
vendor: apple model: safari
vendor: apple model: iphone
db: NVD ids: CVE-2023-32434, CVE-2023-32435, CVE-2023-41990, CVE-2023-38606
Related entries in the VARIoT vulnerabilities database: VAR-202309-2499, VAR-202309-1995, VAR-202401-0651, VAR-202401-0433, VAR-202401-0655, VAR-202401-1328

Trust: 4.25

Fetched: Jan. 5, 2024, 9:18 a.m., Published: Jan. 5, 2024, midnight
Vulnerabilities: denial of service, information disclosure, code execution
Affected productsExternal IDs
vendor: huawei model: huawei
vendor: samsung model: mobile
vendor: samsung model: notes
vendor: google model: pixel
vendor: google model: android
vendor: motorola model: android
vendor: motorola model: motorola
db: NVD ids: CVE-2023-48350, CVE-2023-33032, CVE-2023-48349, CVE-2023-48342, CVE-2023-33109, CVE-2023-33025, CVE-2023-33112, CVE-2023-48340, CVE-2023-48351, CVE-2024-0016, CVE-2023-21245, CVE-2023-48344, CVE-2023-28559, CVE-2023-28564, CVE-2023-21651, CVE-2023-48348, CVE-2023-28565, CVE-2023-33014, CVE-2023-28558, CVE-2024-0018, CVE-2023-33044, CVE-2023-43511, CVE-2023-48341, CVE-2023-28548, CVE-2023-33040, CVE-2023-33062, CVE-2023-33033, CVE-2023-21165, CVE-2024-0017, CVE-2024-0015, CVE-2023-33030, CVE-2023-5427, CVE-2023-32874, CVE-2023-32872, CVE-2023-28557, CVE-2023-48352, CVE-2023-28567, CVE-2024-0021, CVE-2022-33275, CVE-2023-4295, CVE-2023-28560, CVE-2023-48343, CVE-2023-33036, CVE-2023-33037, CVE-2023-33043, CVE-2023-28544, CVE-2024-0020, CVE-2024-0019, CVE-2024-0023, CVE-2023-40085

Trust: 5.25

Fetched: Jan. 5, 2024, 9:17 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: timing attack, information disclosure, denial of service...
Affected productsExternal IDs
vendor: cisco model: cisco nexus 9000 series
vendor: cisco model: nexus 9000 series
vendor: cisco model: series
vendor: cisco model: nexus 9000
vendor: cisco model: nexus
vendor: infineon model: rsa library
vendor: infineon model: trusted platform
vendor: citrix model: gateway
vendor: dell model: latitude
vendor: dell model: bios
vendor: google model: chrome os
vendor: google model: chrome
vendor: google model: nexus
db: NVD ids: CVE-2020-5851, CVE-2023-30633, CVE-2021-42299, CVE-2020-12946, CVE-2022-1053, CVE-2022-23645, CVE-2022-26355, CVE-2020-12926, CVE-2021-3505, CVE-2023-43635, CVE-2023-22745, CVE-2023-1018, CVE-2017-15361, CVE-2021-32015, CVE-2021-1656, CVE-2017-16837, CVE-2011-1160, CVE-2020-8918, CVE-2014-8669, CVE-2023-1017, CVE-2018-6686, CVE-2019-16863, CVE-2010-4121, CVE-2011-1162, CVE-2019-1589, CVE-2020-26933, CVE-2021-3623, CVE-2007-5559, CVE-2008-5686, CVE-2019-6322, CVE-2018-6622, CVE-2017-10606, CVE-2023-29360, CVE-2023-43632, CVE-2014-0881, CVE-2023-3674, CVE-2022-2977, CVE-2019-6321, CVE-2021-38576, CVE-2013-3582

Trust: 4.5

Fetched: Jan. 5, 2024, 9:11 a.m., Published: Jan. 4, 2024, 7:02 a.m.
Vulnerabilities: injection attack, code execution, remote command injection...
Affected productsExternal IDs
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: adaptive security appliance
vendor: cisco model: router
vendor: cisco model: sd-wan vmanage
vendor: cisco model: sd-wan
vendor: cisco model: series
vendor: cisco systems model: cisco adaptive security appliance
vendor: cisco systems model: adaptive security appliance
vendor: cisco systems model: router
vendor: cisco systems model: sd-wan vmanage
vendor: cisco systems model: sd-wan
vendor: cisco systems model: series

Trust: 5.0

Fetched: Jan. 5, 2024, 9:10 a.m., Published: Jan. 4, 2024, 9:37 p.m.
Vulnerabilities: sql injection, code execution
Affected productsExternal IDs
vendor: mobileiron model: sentry
db: NVD ids: CVE-2023-39366, CVE-2023-35078, CVE-2023-38035, CVE-2023-35081

Trust: 5.5

Fetched: Jan. 5, 2024, 9:09 a.m., Published: Dec. 31, 2023, noon
Vulnerabilities: buffer overflow, denial of service, code execution
Affected productsExternal IDs
vendor: apple model: tvos
vendor: apple model: iphone
vendor: apple model: webkit
vendor: apple model: safari
vendor: apple model: macos
vendor: apple model: watchos
vendor: google model: chrome
vendor: google model: pixel
vendor: google model: android
db: NVD ids: CVE-2023-7024, CVE-2023-40078, CVE-2023-4291, CVE-2023-42890, CVE-2023-40094, CVE-2023-42898, CVE-2023-6702, CVE-2023-42940, CVE-2023-42899, CVE-2023-40088

Trust: 4.75

Fetched: Jan. 3, 2024, 9:57 a.m., Published: Dec. 12, 2023, 11:38 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: apple model: macos
vendor: apple model: safari
vendor: apple model: tvos
vendor: apple model: watchos
vendor: apple model: webkit
db: NVD ids: CVE-2023-42883, CVE-2023-42917, CVE-2023-45866, CVE-2023-42890, CVE-2023-42916

Trust: 3.25

Fetched: Jan. 3, 2024, 9:54 a.m., Published: Jan. 3, 2024, 5:15 a.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs
db: NVD ids: CVE-2023-7027