VARIoT news about IoT security

Trust: 5.75

Fetched: Jan. 10, 2024, 9:12 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: bosch model: nexo
db: NVD ids: CVE-2023-48258, CVE-2023-48248, CVE-2023-48254, CVE-2023-48251, CVE-2023-48253, CVE-2023-48252, CVE-2023-48265, CVE-2023-48262, CVE-2023-48244, CVE-2023-48247, CVE-2023-48266, CVE-2023-48246, CVE-2023-48263, CVE-2023-48245, CVE-2023-48260, CVE-2023-48261, CVE-2023-48257, CVE-2023-48249, CVE-2023-48264, CVE-2023-48255, CVE-2023-48243, CVE-2023-48259, CVE-2023-48256, CVE-2023-48250, CVE-2023-48242

Trust: 4.75

Fetched: Jan. 10, 2024, 9:07 a.m., Published: Jan. 9, 2024, 9:52 a.m.
Vulnerabilities: path traversal, cross-site scripting, sql injection...
Affected productsExternal IDs
vendor: netatalk model: netatalk
db: NVD ids: CVE-2022-43634, CVE-2023-47560, CVE-2023-50916, CVE-2023-41287, CVE-2023-47559, CVE-2023-39296, CVE-2023-41288

Trust: 3.75

Fetched: Jan. 9, 2024, 10:23 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
vendor: cisco model: ios xe software
vendor: cisco systems model: cisco ios xe
vendor: cisco systems model: cisco ios
vendor: cisco systems model: ios xe
vendor: cisco systems model: ios xe software
db: NVD ids: CVE-2023-20198, CVE-2023-20273

Trust: 4.0

Fetched: Jan. 9, 2024, 10:19 a.m., Published: Jan. 5, 2024, 3:08 p.m.
Vulnerabilities: sql injection, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-39336

Trust: 3.5

Fetched: Jan. 9, 2024, 10:19 a.m., Published: Dec. 14, 2023, 7:45 a.m.
Vulnerabilities: code execution, security bypass
Affected productsExternal IDs
vendor: samsung model: galaxy
vendor: samsung model: samsung mobile
vendor: samsung model: knox
vendor: samsung model: mobile phones
vendor: samsung model: mobile

Trust: 3.25

Fetched: Jan. 9, 2024, 10:17 a.m., Published: -
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-35629

Trust: 4.25

Fetched: Jan. 9, 2024, 10:16 a.m., Published: Dec. 18, 2023, midnight
Vulnerabilities: information leakage, default credentials
Affected productsExternal IDs
vendor: google model: home

Trust: 4.25

Fetched: Jan. 9, 2024, 10:16 a.m., Published: Jan. 7, 2024, 9:15 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
db: NVD ids: CVE-2023-7209

Trust: 3.75

Fetched: Jan. 9, 2024, 10:15 a.m., Published: Jan. 4, 2024, 5:22 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: google chrome
vendor: google model: android
vendor: google model: chrome
db: NVD ids: CVE-2024-0224, CVE-2024-0223, CVE-2024-0225, CVE-2024-0222
Related entries in the VARIoT vulnerabilities database: VAR-202205-1788, VAR-201404-0470, VAR-201911-1316, VAR-201404-0106, VAR-201903-0209, VAR-201810-1203, VAR-201104-0174, VAR-201905-0654, VAR-202211-1501, VAR-201802-0673, VAR-202305-2121, VAR-202112-2003, VAR-201512-0082, VAR-202203-0913, VAR-202304-1913, VAR-201704-1363, VAR-200412-0994, VAR-200708-0021, VAR-201512-0084, VAR-202207-1385, VAR-202304-1906, VAR-202301-0921, VAR-202112-2004, VAR-202203-1898, VAR-201910-1281, VAR-201904-1090, VAR-201911-1314, VAR-201911-1315, VAR-201808-0226, VAR-201904-1092, VAR-201710-1144, VAR-201801-1490, VAR-201905-0028, VAR-202304-2162, VAR-202012-0977, VAR-202308-2818, VAR-200505-0603, VAR-202305-0209, VAR-201906-0481, VAR-201811-0080, VAR-201512-0093, VAR-202107-0888, VAR-202003-0923, VAR-201904-0115, VAR-202207-1298, VAR-200803-0332, VAR-202112-2079, VAR-201905-0657, VAR-201406-0156, VAR-201111-0160, VAR-202304-2073, VAR-201512-0085, VAR-201712-0575, VAR-200909-0001, VAR-201808-0956, VAR-201903-0022, VAR-200708-0020, VAR-201906-0479, VAR-201811-0679, VAR-202112-2078, VAR-201512-0083, VAR-202205-1787, VAR-202003-1707, VAR-200909-0002, VAR-202304-1936, VAR-202212-1097, VAR-200607-0314, VAR-202302-0865, VAR-201905-0653, VAR-200708-0018, VAR-201911-1313, VAR-200605-0268, VAR-202305-2285, VAR-201905-0651, VAR-201709-0027, VAR-201811-0016, VAR-202009-0964, VAR-202103-0233, VAR-201512-0086, VAR-202304-1973, VAR-201904-1091, VAR-201911-1311, VAR-202205-1789, VAR-201512-0094, VAR-202205-1790, VAR-201401-0271, VAR-201911-1312, VAR-201704-1556, VAR-201904-1089, VAR-202008-0765, VAR-201404-0472, VAR-201811-0079, VAR-201707-0041, VAR-201404-0471, VAR-201410-1357, VAR-201404-0469, VAR-201410-1356, VAR-200805-0357, VAR-201804-1287, VAR-201904-1093, VAR-202006-0920, VAR-200708-0019, VAR-202205-0957, VAR-201702-0159

Trust: 6.25

Fetched: Jan. 9, 2024, 10:13 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: session hijacking, privilege escalation, information exposure...
Affected productsExternal IDs
vendor: prestige model: zyxel
vendor: tp-link model: routers
vendor: tp-link model: gateway
vendor: zyxel model: gs1900-8 firmware
vendor: zyxel model: o2 dsl router classic
vendor: zyxel model: vmg8924-b30a
vendor: zyxel model: vmg1312-b10d
vendor: zyxel model: nsa210
vendor: zyxel model: usg40w
vendor: zyxel model: sbg3300-nb00
vendor: zyxel model: sbg3300-n000
vendor: zyxel model: vmg3312-b10b 1.00
vendor: zyxel model: vsg1435-b101
vendor: zyxel model: fr1000z
vendor: zyxel model: nwa1100-nh
vendor: zyxel model: gs1900-24
vendor: zyxel model: zynos
vendor: zyxel model: prestige 642r
vendor: zyxel model: p-870h-51
vendor: zyxel model: vmg1312-b30b
vendor: zyxel model: multy x
vendor: zyxel model: nwa3560-n
vendor: zyxel model: nas 326
vendor: zyxel model: nsa325
vendor: zyxel model: usg60
vendor: zyxel model: vmg1312-b30a
vendor: zyxel model: prestige
vendor: zyxel model: gs1900-8
vendor: zyxel model: pk5001z
vendor: zyxel model: wap6806
vendor: zyxel model: atp200
vendor: zyxel model: nwa1123-ac
vendor: zyxel model: q1000
vendor: zyxel model: p-663hn-51
vendor: zyxel model: xgs2210-52hp
vendor: zyxel model: nsa320s
vendor: zyxel model: adsl router
vendor: zyxel model: nsa220
vendor: zyxel model: nbg6716
vendor: zyxel model: nas520
vendor: zyxel model: nsa221
vendor: zyxel model: atp800
vendor: zyxel model: gs1900-8hp firmware
vendor: zyxel model: nsa325v2
vendor: zyxel model: vmg8924-b10a
vendor: zyxel model: zywall 310
vendor: zyxel model: usg20-vpn
vendor: zyxel model: wre6505
vendor: zyxel model: gs1900-8hp
vendor: zyxel model: p-660hw v3
vendor: zyxel model: nsa310
vendor: zyxel model: pmg5318-b20a
vendor: zyxel model: atp500
vendor: zyxel model: usg210
vendor: zyxel model: usg1900
vendor: zyxel model: usg310
vendor: zyxel model: usg60w
vendor: zyxel model: p660hn-t1a v1
vendor: zyxel model: p8702n
vendor: zyxel model: vmg1312-b10a
vendor: zyxel model: nas540
vendor: zyxel model: nsa325 v2
vendor: zyxel model: p-660hw-t1
vendor: zyxel model: nwa1123-ni
vendor: zyxel model: p-330w router
vendor: zyxel model: nas542
vendor: zyxel model: sbg3500-n000
vendor: zyxel model: p-660hw-t1 2
vendor: zyxel model: vmg3312-b10b
vendor: zyxel model: zywall
vendor: zyxel model: p-330w
vendor: zyxel model: p-660hw
vendor: zyxel model: nas326
vendor: zyxel model: ac3000
vendor: zyxel model: vmg8324-b10a
vendor: zyxel model: dsl-491hnu-b1b v2
vendor: zyxel model: emg2926
vendor: zyxel model: usg50
vendor: zyxel model: n300 netusb nbg-419n
vendor: zyxel model: nsa310s
vendor: zyxel model: usg2200-vpn
vendor: zyxel model: prestige 660h-61
vendor: zyxel model: usg40
vendor: zyxel model: nsa320
vendor: zyxel model: vmg4380-b10a
vendor: zyxel model: p-870h-51 dsl router
vendor: zyxel model: nwa1121-ni
vendor: zyxel model: p-335wt router
vendor: zyxel model: p660hn-t1a v2
vendor: zyxel model: nwa1100-n
vendor: zyxel model: zywall 1100
vendor: zyxel model: p-660hn-51
vendor: zyxel model: usg2200
vendor: zyxel model: usg1100
vendor: zyxel model: vmg3312 b10b
vendor: zyxel model: zywall 110
vendor: zyxel model: usg20w-vpn
vendor: zyxel model: nbg-418n
vendor: zyxel model: c1000z
vendor: zyxel model: usg110
vendor: zyxel model: vmg5313-b30b
vendor: zyxel model: zyxel xgs2210-52hp
vendor: d-link model: router
vendor: netgear model: router
vendor: netgear model: rt314
vendor: netgear model: n300
vendor: netgear model: rt311
vendor: huawei model: huawei
vendor: huawei model: mt882
vendor: huawei model: usg2200
db: NVD ids: CVE-2022-0734, CVE-2014-0354, CVE-2020-15321, CVE-2022-45439, CVE-2019-15804, CVE-2020-15318, CVE-2013-3588, CVE-2022-38546, CVE-2019-7391, CVE-2018-18754, CVE-2011-0746, CVE-2017-18371, CVE-2022-40602, CVE-2018-1164, CVE-2020-15330, CVE-2023-33009, CVE-2023-22921, CVE-2020-15324, CVE-2023-34138, CVE-2021-35035, CVE-2022-0556, CVE-2015-6016, CVE-2023-27988, CVE-2020-25014, CVE-2005-3724, CVE-2020-29299, CVE-2021-46387, CVE-2023-22916, CVE-2020-15335, CVE-2017-7964, CVE-2004-1540, CVE-2008-1523, CVE-2008-1259, CVE-2008-1526, CVE-2007-4319, CVE-2008-1527, CVE-2008-1525, CVE-2008-1254, CVE-2008-1255, CVE-2020-15329, CVE-2023-27992, CVE-2023-35137, CVE-2015-6018, CVE-2002-0438, CVE-2022-2030, CVE-2023-27990, CVE-2021-4030, CVE-2022-0823, CVE-2021-35036, CVE-2020-15345, CVE-2020-15327, CVE-2022-43393, CVE-2021-35034, CVE-2020-15325, CVE-2020-15333, CVE-2008-1522, CVE-2022-0342, CVE-2020-15313, CVE-2023-28770, CVE-2020-15334, CVE-2019-17354, CVE-2019-10631, CVE-2023-37925, CVE-2020-15331, CVE-2019-15802, CVE-2019-15803, CVE-2018-15602, CVE-2022-43390, CVE-2019-10633, CVE-2017-15226, CVE-2022-26414, CVE-2021-35030, CVE-2020-15315, CVE-2018-5330, CVE-2020-13364, CVE-2019-6725, CVE-2023-4397, CVE-2023-27991, CVE-2020-29583, CVE-2023-33013, CVE-2005-0328, CVE-2022-43389, CVE-2023-22919, CVE-2023-5960, CVE-2019-12583, CVE-2018-14893, CVE-2015-7283, CVE-2023-37927, CVE-2023-34139, CVE-2023-28768, CVE-2023-33011, CVE-2023-34140, CVE-2021-35029, CVE-2019-13495, CVE-2001-1135, CVE-2023-37928, CVE-2020-15316, CVE-2019-9955, CVE-2020-15326, CVE-2020-15320, CVE-2022-30526, CVE-2008-1160, CVE-2006-0302, CVE-2021-35031, CVE-2017-18374, CVE-2023-22915, CVE-2020-15332, CVE-2021-4039, CVE-2014-4162, CVE-2022-34746, CVE-2020-15343, CVE-2011-4504, CVE-2002-1071, CVE-2020-15314, CVE-2023-22920, CVE-2023-22924, CVE-2022-45854, CVE-2022-43392, CVE-2023-28771, CVE-2022-45440, CVE-2023-35139, CVE-2015-6019, CVE-2023-4473, CVE-2008-1257, CVE-2020-15337, CVE-2023-28769, CVE-2017-17901, CVE-2020-13365, CVE-2020-15348, CVE-2007-6729, CVE-2023-22913, CVE-2018-9129, CVE-2019-6710, CVE-2023-34141, CVE-2007-4318, CVE-2022-45441, CVE-2023-4474, CVE-2020-15336, CVE-2019-12581, CVE-2022-43391, CVE-2018-19326, CVE-2020-15338, CVE-2021-35032, CVE-2023-37926, CVE-2015-6017, CVE-2002-1072, CVE-2022-0910, CVE-2020-9054, CVE-2007-6730, CVE-2020-15342, CVE-2023-22917, CVE-2022-40603, CVE-2020-15319, CVE-2020-15312, CVE-2006-3929, CVE-2022-38547, CVE-2020-15347, CVE-2023-28767, CVE-2023-22923, CVE-2023-35136, CVE-2020-15346, CVE-2017-18370, CVE-2007-4316, CVE-2019-15801, CVE-2023-5797, CVE-2006-2562, CVE-2008-1524, CVE-2004-1684, CVE-2020-15328, CVE-2023-33010, CVE-2017-18368, CVE-2023-35138, CVE-2015-7256, CVE-2005-3725, CVE-2021-35033, CVE-2020-15323, CVE-2020-15344, CVE-2008-1260, CVE-2017-17550, CVE-2020-15339, CVE-2020-15322, CVE-2008-1261, CVE-2020-24355, CVE-2020-28899, CVE-2015-6020, CVE-2023-22918, CVE-2019-10632, CVE-2019-15799, CVE-2008-1256, CVE-2023-5650, CVE-2022-26532, CVE-2015-7284, CVE-2022-26531, CVE-2013-6786, CVE-2021-35028, CVE-2019-15800, CVE-2008-1529, CVE-2008-1528, CVE-2023-22914, CVE-2017-6884, CVE-2019-10630, CVE-2020-24354, CVE-2019-15815, CVE-2008-1521, CVE-2021-4029, CVE-2023-43314, CVE-2020-15341, CVE-2014-0356, CVE-2001-1194, CVE-2020-15317, CVE-2018-14892, CVE-2016-10401, CVE-2022-45853, CVE-2014-0355, CVE-2022-34747, CVE-2014-7278, CVE-2014-0353, CVE-2005-1717, CVE-2023-22922, CVE-2014-7277, CVE-2023-33012, CVE-2022-26413, CVE-2023-4398, CVE-2008-2167, CVE-2023-35140, CVE-2018-9149, CVE-2023-27989, CVE-2019-10634, CVE-2020-14461, CVE-2021-3297, CVE-2020-15340, CVE-2021-35027, CVE-2007-4317, CVE-2022-30525, CVE-2016-10227
Related entries in the VARIoT vulnerabilities database: VAR-202302-0482, VAR-202302-0195, VAR-202309-0672

Trust: 5.75

Fetched: Jan. 9, 2024, 10:11 a.m., Published: Jan. 5, 2024, 9:48 a.m.
Vulnerabilities: buffer overflow
Affected productsExternal IDs
vendor: unitronics model: visilogic
vendor: rockwell automation model: studio 5000
vendor: rockwell automation model: automation factorytalk
vendor: rockwell automation model: studio 5000 logix designer
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: factorytalk activation
vendor: rockwell automation model: automation factorytalk activation manager
vendor: rockwell model: studio 5000
vendor: rockwell model: automation factorytalk
vendor: rockwell model: studio 5000 logix designer
vendor: rockwell model: factorytalk
vendor: rockwell model: factorytalk activation
vendor: rockwell model: automation factorytalk activation manager
vendor: wibu model: codemeter
vendor: wibu model: codemeter runtime
vendor: wibu-systems model: codemeter
vendor: wibu-systems model: codemeter runtime
db: NVD ids: CVE-2022-4304, CVE-2022-4450, CVE-2023-3935, CVE-2023-0286, CVE-2023-38545, CVE-2023-6448
Related entries in the VARIoT vulnerabilities database: VAR-202004-2199, VAR-202004-2191, VAR-201712-0862, VAR-201801-0036, VAR-202110-1615

Trust: 5.25

Fetched: Jan. 9, 2024, 10:08 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, information disclosure, cross-site request forgery...
Affected productsExternal IDs
vendor: jquery model: jquery
vendor: typo3 model: typo3
db: NVD ids: CVE-2018-18405, CVE-2019-8121, CVE-2023-2582, CVE-2022-23395, CVE-2021-44030, CVE-2019-9951, CVE-2022-31147, CVE-2021-41184, CVE-2015-6969, CVE-2019-12308, CVE-2019-11358, CVE-2016-10707, CVE-2013-4634, CVE-2020-6978, CVE-2020-11023, CVE-2021-20086, CVE-2021-21252, CVE-2019-13488, CVE-2020-29587, CVE-2015-9444, CVE-2021-43862, CVE-2020-11022, CVE-2018-8768, CVE-2014-5259, CVE-2015-1840, CVE-2013-2023, CVE-2015-6584, CVE-2022-2144, CVE-2013-2022, CVE-2010-0760, CVE-2020-7656, CVE-2020-25814, CVE-2011-5180, CVE-2021-37504, CVE-2015-9479, CVE-2021-20084, CVE-2021-20083, CVE-2018-1325, CVE-2012-6662, CVE-2021-43306, CVE-2023-5113, CVE-2021-41182, CVE-2023-5464, CVE-2015-7943, CVE-2020-23064, CVE-2013-1808, CVE-2023-5432, CVE-2021-32682, CVE-2015-2982, CVE-2010-0759, CVE-2017-15719, CVE-2021-32821, CVE-2023-0171, CVE-2014-8739, CVE-2022-31160, CVE-2013-4997, CVE-2012-6708, CVE-2018-9206, CVE-2013-1942, CVE-2023-1275, CVE-2010-5312, CVE-2016-7103, CVE-2015-2089, CVE-2021-24543, CVE-2014-6071, CVE-2021-20087, CVE-2015-3233, CVE-2017-6929, CVE-2018-9207, CVE-2017-17560, CVE-2020-26120, CVE-2023-4890, CVE-2015-9251, CVE-2021-32860, CVE-2021-34663, CVE-2022-25495, CVE-2018-9208, CVE-2013-7129, CVE-2011-4969, CVE-2023-5430, CVE-2013-1463, CVE-2021-32850, CVE-2021-41183, CVE-2015-2531, CVE-2023-2648, CVE-2019-1010113, CVE-2021-43956, CVE-2007-2379, CVE-2013-0244, CVE-2013-4383, CVE-2021-36713

Trust: 3.75

Fetched: Jan. 9, 2024, 10:08 a.m., Published: March 1, 2019, 10:06 a.m.
Vulnerabilities: default password
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-201810-0187, VAR-201810-0185, VAR-201810-0186, VAR-200609-0527, VAR-201105-0133

Trust: 5.25

Fetched: Jan. 9, 2024, 10:06 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, integer overflow, search path vulnerability...
Affected productsExternal IDs
vendor: audiocodes model: 450hd
vendor: audiocodes model: 440hd
vendor: jquery model: jquery
vendor: polycom model: vvx 500
db: NVD ids: CVE-2005-2300, CVE-2017-0283, CVE-2023-5615, CVE-2017-9948, CVE-2019-13633, CVE-2016-3303, CVE-2021-26421, CVE-2023-31802, CVE-2020-1025, CVE-2008-4875, CVE-2004-1114, CVE-2017-11786, CVE-2015-6106, CVE-2023-36786, CVE-2009-4567, CVE-2016-0145, CVE-2016-3209, CVE-2007-4429, CVE-2008-0454, CVE-2017-6517, CVE-2016-3262, CVE-2023-2362, CVE-2004-1777, CVE-2022-26911, CVE-2017-8695, CVE-2016-3304, CVE-2023-36789, CVE-2018-0594, CVE-2004-1778, CVE-2014-6886, CVE-2016-3396, CVE-2018-18568, CVE-2008-4874, CVE-2019-0798, CVE-2015-2536, CVE-2008-0583, CVE-2016-3263, CVE-2006-2312, CVE-2019-0622, CVE-2019-0932, CVE-2005-3265, CVE-2023-41763, CVE-2021-24073, CVE-2020-1462, CVE-2015-2503, CVE-2021-24099, CVE-2017-0014, CVE-2007-3845, CVE-2023-36780, CVE-2019-1029, CVE-2017-8528, CVE-2005-3738, CVE-2016-4377, CVE-2017-8550, CVE-2017-0261, CVE-2005-3267, CVE-2018-18566, CVE-2018-18567, CVE-2017-8676, CVE-2019-1490, CVE-2015-6061, CVE-2016-7182, CVE-2011-1717, CVE-2017-0108, CVE-2007-5989, CVE-2021-39416, CVE-2010-3136, CVE-2014-3544, CVE-2018-0595, CVE-2018-8238, CVE-2006-5038, CVE-2022-26910, CVE-2021-36845, CVE-2008-5697, CVE-2016-5720, CVE-2017-0262, CVE-2007-3896, CVE-2005-1407, CVE-2018-8546, CVE-2017-0281, CVE-2020-24003, CVE-2017-8696, CVE-2015-6108, CVE-2018-8311, CVE-2009-4741, CVE-2008-2545, CVE-2019-0624, CVE-2020-25375, CVE-2020-27515, CVE-2015-2531, CVE-2022-33633, CVE-2008-0582, CVE-2022-34805, CVE-2011-2074, CVE-2021-26422, CVE-2020-1432, CVE-2015-6107, CVE-2016-3301, CVE-2022-24522, CVE-2006-5084, CVE-2008-1805
Related entries in the VARIoT vulnerabilities database: VAR-200809-0441, VAR-200212-0418, VAR-199905-0031, VAR-200204-0009, VAR-200703-0122, VAR-200508-0061, VAR-199912-0051, VAR-200411-0028, VAR-199912-0002, VAR-200911-0398, VAR-201404-0015, VAR-201006-1235, VAR-200211-0048, VAR-200208-0015, VAR-200109-0119, VAR-201009-0051, VAR-202104-1943, VAR-200010-0022, VAR-200111-0009, VAR-201211-0024, VAR-199701-0039, VAR-200109-0118, VAR-199912-0052, VAR-200212-0417, VAR-200507-0033, VAR-200003-0003, VAR-200005-0005, VAR-200204-0012, VAR-200408-0134, VAR-199912-0053, VAR-200211-0046, VAR-201110-0170, VAR-200212-0495, VAR-199901-0163, VAR-200901-0465, VAR-200106-0035, VAR-200208-0012, VAR-200002-0025, VAR-201703-1246, VAR-199906-0024, VAR-201009-0027, VAR-200204-0011, VAR-200204-0008, VAR-200212-0468, VAR-200007-0069, VAR-200306-0097, VAR-199909-0007, VAR-199905-0029, VAR-200007-0038, VAR-200012-0021, VAR-200912-0322, VAR-200612-0119, VAR-200906-0257, VAR-199901-0162, VAR-199901-0178, VAR-200607-0007, VAR-200908-0339, VAR-200612-0120, VAR-200006-0150, VAR-200107-0142, VAR-199908-0015, VAR-199905-0048, VAR-200005-0057, VAR-200010-0126, VAR-200012-0155, VAR-200306-0100, VAR-200102-0098, VAR-201211-0023, VAR-200904-0432, VAR-200012-0187, VAR-199908-0035, VAR-200512-1034, VAR-200705-0069, VAR-201411-0146, VAR-200007-0068, VAR-200212-0339, VAR-199905-0028, VAR-200904-0435, VAR-200809-0440, VAR-199902-0053, VAR-200909-0359, VAR-200003-0023, VAR-201112-0001, VAR-200011-0006, VAR-200102-0001, VAR-200106-0117, VAR-200211-0070, VAR-200204-0016, VAR-200802-0021, VAR-200101-0033, VAR-200303-0063, VAR-201810-0478, VAR-200204-0019, VAR-200612-0480, VAR-200205-0126, VAR-200204-0010, VAR-200204-0007, VAR-200204-0017, VAR-200012-0153, VAR-200204-0018, VAR-200212-0461, VAR-200112-0132, VAR-199912-0172, VAR-200004-0018, VAR-200212-0570, VAR-199905-0030, VAR-200005-0053, VAR-200310-0075, VAR-199907-0014, VAR-200810-0368, VAR-199912-0194, VAR-201012-0044, VAR-200101-0078, VAR-200211-0047, VAR-200109-0117, VAR-200212-0467, VAR-200102-0009, VAR-199907-0036, VAR-201009-0028, VAR-200306-0099, VAR-200705-0032, VAR-200005-0109, VAR-200107-0105, VAR-201002-0299, VAR-200106-0028, VAR-200306-0098, VAR-199908-0031, VAR-200006-0151, VAR-199912-0110, VAR-200106-0115, VAR-201108-0125, VAR-200912-0321, VAR-199901-0177, VAR-200901-0464, VAR-200802-0020, VAR-201508-0275, VAR-200906-0272, VAR-200207-0023, VAR-200106-0024, VAR-199902-0037, VAR-200109-0072

Trust: 5.25

Fetched: Jan. 9, 2024, 10:02 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: open redirect vulnerability, session hijacking, memory leak...
Affected productsExternal IDs
vendor: hitachi model: ucosminexus application server
vendor: hitachi model: web server
vendor: hitachi model: hirdb
vendor: hitachi model: jp1/performance management
vendor: novell model: zenworks
vendor: novell model: client
vendor: ge healthcare model: centricity pacs workstation
vendor: ge healthcare model: centricity pacs
vendor: carestream model: vue ris
vendor: carestream model: carestream vue ris
vendor: typo3 model: typo3
vendor: trend micro model: password manager
vendor: trend micro model: security
vendor: mailenable model: mailenable enterprise
vendor: mailenable model: enterprise
vendor: mailenable model: professional
vendor: trend model: password manager
vendor: trend model: security
vendor: rockwell automation model: automation factorytalk assetcentre
vendor: rockwell automation model: automation factorytalk
vendor: rockwell automation model: factorytalk
vendor: cisco model: series
vendor: cisco model: mobility manager
vendor: cisco model: information server
vendor: rockwell model: automation factorytalk assetcentre
vendor: rockwell model: automation factorytalk
vendor: rockwell model: factorytalk
vendor: symantec model: im manager
db: NVD ids: CVE-2008-4301, CVE-2023-6352, CVE-2002-1718, CVE-1999-0739, CVE-2002-0073, CVE-2007-1278, CVE-2005-2678, CVE-1999-0349, CVE-1999-1223, CVE-2003-0718, CVE-1999-1451, CVE-2009-3555, CVE-2012-5674, CVE-2011-5279, CVE-2010-1256, CVE-2002-1182, CVE-2002-0422, CVE-2001-0508, CVE-2010-1899, CVE-2021-27474, CVE-2000-0079, CVE-2000-0770, CVE-2001-0902, CVE-2012-2532, CVE-2019-1365, CVE-2008-3697, CVE-1999-0253, CVE-2001-0507, CVE-1999-1233, CVE-2019-11989, CVE-2002-1717, CVE-2005-2089, CVE-2002-0054, CVE-2000-0097, CVE-2007-4586, CVE-2010-1886, CVE-2000-0226, CVE-1999-1397, CVE-2000-0304, CVE-2002-0079, CVE-2020-1255, CVE-2017-0055, CVE-2004-0205, CVE-2011-1068, CVE-1999-1148, CVE-2002-1180, CVE-2005-4047, CVE-1999-0281, CVE-2007-6498, CVE-2011-2012, CVE-2018-18931, CVE-2015-1635, CVE-2002-1795, CVE-1999-0450, CVE-2007-6504, CVE-2004-1312, CVE-2003-1567, CVE-2015-7597, CVE-2003-1102, CVE-2001-0241, CVE-2002-0419, CVE-2000-0167, CVE-2008-2579, CVE-2017-7269, CVE-2009-1536, CVE-2002-1310, CVE-1999-0874, CVE-2013-3280, CVE-2010-2730, CVE-2002-0075, CVE-2022-30209, CVE-2018-16956, CVE-2002-0072, CVE-2018-16958, CVE-2002-1745, CVE-2020-0645, CVE-2000-0631, CVE-2003-1342, CVE-2003-0223, CVE-1999-0777, CVE-1999-0737, CVE-2000-0649, CVE-2000-0970, CVE-2009-4445, CVE-2001-0337, CVE-2018-1234, CVE-2006-6578, CVE-2009-1122, CVE-2021-24490, CVE-1999-0449, CVE-1999-1544, CVE-2006-0026, CVE-2018-1323, CVE-2020-1476, CVE-2009-3023, CVE-2008-5457, CVE-2006-6579, CVE-2001-1510, CVE-2001-0500, CVE-1999-0360, CVE-1999-0725, CVE-1999-0229, CVE-2019-0941, CVE-2000-0413, CVE-2000-0746, CVE-2000-0886, CVE-2016-0382, CVE-2000-0115, CVE-2003-0226, CVE-2002-1876, CVE-2003-0904, CVE-2001-0096, CVE-2000-0071, CVE-2012-2531, CVE-2014-5359, CVE-2009-1012, CVE-2000-0951, CVE-1999-0561, CVE-1999-0867, CVE-2005-4360, CVE-2010-3229, CVE-2001-1511, CVE-2008-2027, CVE-2007-2815, CVE-2004-0928, CVE-2014-4078, CVE-2000-0630, CVE-2002-1908, CVE-2023-24814, CVE-1999-0736, CVE-2020-5632, CVE-2009-2509, CVE-1999-0348, CVE-2009-1016, CVE-2003-1306, CVE-2023-3440, CVE-2008-4300, CVE-2006-1394, CVE-1999-0412, CVE-2009-2521, CVE-2001-0544, CVE-2000-0246, CVE-2001-0336, CVE-2007-6750, CVE-2000-0858, CVE-2000-1090, CVE-2015-7490, CVE-2018-1233, CVE-2008-1436, CVE-2004-0574, CVE-2001-0335, CVE-2001-0334, CVE-2002-0869, CVE-1999-0233, CVE-2002-0147, CVE-2019-12925, CVE-2008-0075, CVE-2000-1147, CVE-2003-0109, CVE-2018-17891, CVE-2002-0150, CVE-2018-14773, CVE-2006-5858, CVE-1999-1035, CVE-2002-0224, CVE-2002-0074, CVE-2002-0071, CVE-2002-0148, CVE-2000-0884, CVE-2002-2404, CVE-2002-0149, CVE-2000-0126, CVE-2002-1790, CVE-2002-0862, CVE-2001-1186, CVE-2000-0025, CVE-1999-1591, CVE-2000-0258, CVE-2002-1694, CVE-2003-0317, CVE-1999-0738, CVE-2018-20221, CVE-2020-1112, CVE-2000-0408, CVE-2003-0702, CVE-2007-6499, CVE-1999-1011, CVE-2005-0871, CVE-1999-1376, CVE-2008-1446, CVE-2000-0024, CVE-2018-18930, CVE-2001-0545, CVE-2005-4734, CVE-1999-0278, CVE-2013-0941, CVE-2011-3414, CVE-2010-3972, CVE-2000-1104, CVE-2002-1181, CVE-2012-4591, CVE-2001-0506, CVE-2010-0112, CVE-2010-2375, CVE-2002-1744, CVE-2007-0086, CVE-2001-0004, CVE-2007-0087, CVE-1999-1537, CVE-2023-36434, CVE-2002-0421, CVE-2018-1232, CVE-2010-2731, CVE-2003-0225, CVE-2000-0942, CVE-2007-2897, CVE-2001-0524, CVE-2000-0457, CVE-2013-1081, CVE-2001-1243, CVE-2009-4890, CVE-2003-1582, CVE-2001-0151, CVE-2013-0005, CVE-2003-0224, CVE-1999-0682, CVE-1999-0191, CVE-2000-0778, CVE-1999-0154, CVE-2001-0333, CVE-2003-0349, CVE-2003-0105, CVE-2022-36664, CVE-2011-3140, CVE-2009-4444, CVE-1999-1538, CVE-2003-1566, CVE-2011-4142, CVE-2002-1895, CVE-2016-0152, CVE-2016-0899, CVE-2008-0074, CVE-2003-0227, CVE-1999-0448, CVE-2002-1992, CVE-2022-42136, CVE-2014-4072, CVE-2013-7442, CVE-2009-1535, CVE-2002-1309, CVE-2002-0530, CVE-2002-0364, CVE-2001-0146, CVE-1999-0861, CVE-1999-0407, CVE-2010-3332, CVE-2006-0704, CVE-2001-0709
Related entries in the VARIoT vulnerabilities database: VAR-202001-0834, VAR-202008-0835, VAR-201412-0439, VAR-201806-0911, VAR-201906-0835, VAR-202206-0476, VAR-201011-0100, VAR-201808-0574, VAR-202103-0139, VAR-201705-3255, VAR-201310-0240, VAR-201906-0836, VAR-201804-1364, VAR-202206-1581, VAR-201804-1366, VAR-201310-0244, VAR-202106-1409, VAR-201906-0716, VAR-201212-0024, VAR-202101-0394, VAR-201704-1322, VAR-201705-3256, VAR-202111-1531, VAR-201704-1321, VAR-201906-0213, VAR-201310-0518, VAR-201310-0205, VAR-201712-0953, VAR-201310-0208, VAR-202010-1032, VAR-201310-0248, VAR-201911-1465, VAR-201808-0573, VAR-202001-0856, VAR-201310-0243, VAR-202103-0138, VAR-201812-0753, VAR-201704-1318, VAR-202104-1273, VAR-201401-0286, VAR-201711-0063, VAR-202106-1407, VAR-200710-0194, VAR-201909-1017, VAR-202206-2284, VAR-202206-0540, VAR-201802-0553, VAR-201703-0743, VAR-202204-1008, VAR-202203-1707, VAR-202001-0836, VAR-201801-1309, VAR-201011-0101, VAR-201412-0435, VAR-202103-0137, VAR-201907-1065, VAR-201403-0122, VAR-201911-1468, VAR-201703-0744, VAR-201501-0654, VAR-202203-0288, VAR-201802-0524, VAR-201407-0486, VAR-201806-1265, VAR-201906-0243, VAR-201311-0287, VAR-201711-1047, VAR-201310-0207, VAR-202001-0835, VAR-201911-1467, VAR-201812-0065, VAR-201808-0910, VAR-201704-1319, VAR-202101-0746, VAR-201802-0522, VAR-201912-1602, VAR-202206-1635, VAR-201210-0439, VAR-200906-0175, VAR-202203-1929, VAR-201704-1320, VAR-201011-0102, VAR-202104-0039, VAR-202111-0913, VAR-201807-0267, VAR-202012-0387, VAR-201011-0103, VAR-201909-1018, VAR-202103-0136, VAR-200710-0192, VAR-202002-0707, VAR-201802-0523, VAR-201802-0525, VAR-202106-1408, VAR-201911-1466, VAR-201912-1603, VAR-201310-0247, VAR-201804-1365, VAR-201611-0334, VAR-201704-1527, VAR-200710-0193, VAR-202105-0634, VAR-202008-0808, VAR-201703-1235, VAR-201405-0317, VAR-201704-1528, VAR-202102-0680, VAR-201401-0337, VAR-201011-0104, VAR-200408-0226, VAR-202103-0135

Trust: 5.25

Fetched: Jan. 9, 2024, 10 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: injection attack, code execution, information disclosure...
Affected productsExternal IDs
vendor: tp-link model: gateway
vendor: apexis model: apm-h803-mpc
vendor: samsung model: samsung smartthings hub
vendor: samsung model: smartthings hub
vendor: samsung model: samsung smartthings hub sth-eth-250
vendor: samsung model: smartthings hub sth-eth-250
vendor: samsung model: mobile
vendor: samsung model: note
vendor: samsung model: sth-eth-250
vendor: camtron model: cmnc-200
vendor: samsung smartthings model: samsung smartthings hub
vendor: samsung smartthings model: smartthings hub
vendor: samsung smartthings model: samsung smartthings hub sth-eth-250
vendor: samsung smartthings model: smartthings hub sth-eth-250
vendor: samsung smartthings model: mobile
vendor: samsung smartthings model: note
vendor: samsung smartthings model: sth-eth-250
vendor: grandstream model: gxv3601
vendor: grandstream model: gxv3651fhd
vendor: grandstream model: gxv3500
vendor: grandstream model: gxv3601hd/ll
vendor: grandstream model: gxv3504
vendor: grandstream model: gxv3501
vendor: grandstream model: gxv3611hd/ll
vendor: grandstream model: gxv3615w/p
vendor: grandstream model: gxv3615wp_hd
vendor: grandstream model: gxv3662hd
vendor: sony model: snc dh240t
vendor: sony model: snc dh180
vendor: sony model: snc ch240
vendor: sony model: snc ch140
vendor: sony model: snc dh280
vendor: sony model: snc ch280
vendor: sony model: snc ch180
vendor: sony model: snc dh140t
vendor: sony model: snc dh240
vendor: sony model: snc dh140
vendor: sony model: camera
vendor: vera model: veralite
vendor: vera model: veraedge
vendor: airlive model: wl2600cam
vendor: geutebruck model: g-cam
vendor: geutebruck model: g-cam/efd-2250
vendor: netwave model: ip camera firmware
vendor: netwave model: ip camera
vendor: foscam model: wireless ip camera
vendor: foscam model: ip camera
vendor: foscam model: fi8620
vendor: foscam model: system
vendor: insma model: wifi mini spy 1080p hd security ip camera
vendor: smartthings model: smartthings hub
vendor: dahua model: network camera
vendor: dahua model: ipc-hfw1xxx
vendor: dahua model: ip camera firmware
vendor: dahua model: ipc-hdw1xxx
vendor: dahua model: ipc-hfw2xxx
vendor: dahua model: ip camera
vendor: dahua model: camera
vendor: dahua model: camera firmware
vendor: tecvoz model: cmnc-200
vendor: conceptronic model: cipcamptiwl
vendor: vivotek model: pt7135
vendor: vivotek model: camera
vendor: vivotek model: pt7135 ip camera 0300a
vendor: wificam model: wireless ip camera
vendor: hisilicon model: hi3510 firmware
vendor: hisilicon model: hi3510
vendor: insteon model: hd ip camera white
vendor: insteon model: 2864-222
vendor: siemens model: cvms2025-ir
vendor: siemens model: cfis1425
vendor: siemens model: cvmw3025-ir
vendor: siemens model: ccmw3025
vendor: siemens model: ccis1425
vendor: siemens model: ccid1445-dn28
vendor: siemens model: ccmw1025
vendor: siemens model: ip camera
vendor: siemens model: ccpw3025
vendor: siemens model: ccmd3025-dn18
vendor: siemens model: cfms2025
vendor: siemens model: ccms2025
vendor: siemens model: ccid1445-dn18
vendor: siemens model: cfmw1025
vendor: siemens model: cfmw3025
vendor: siemens model: ccpw5025
vendor: bosch model: ip cameras
vendor: bosch model: iot gateway
vendor: bosch model: cpp6
vendor: bosch model: smart camera
vendor: bosch model: cpp7
vendor: bosch model: bosch ip cameras
vendor: bosch model: cpp7.3
vendor: hichip model: shenzhen hichip vision technology
vendor: hikvision model: ip cameras
vendor: hikvision model: ds-2cd7153-e
vendor: genie access model: wip3bvaf
vendor: loftek model: nexus 543
vendor: loftek model: nexus
vendor: axis model: m1033-w
vendor: axis model: ip cameras
vendor: axis model: p1354
vendor: axis model: network camera
vendor: axis model: axis m1033-w
vendor: axis model: 2100 network camera
vendor: apple model: watch
vendor: brickcom model: wcb-100ap
vendor: brickcom model: wfb-100ap
vendor: brickcom model: brickcom
vendor: brickcom model: md-100ap
vendor: brickcom model: osd-040e
vendor: brickcom model: fb-100ap
vendor: brickcom model: ob-100ae
vendor: d-link model: dcs-5222l
vendor: d-link model: dcs-936l
vendor: d-link model: dcs-5605 ptz ip network camera
vendor: d-link model: dcs-1100
vendor: d-link model: dcs-942l
vendor: d-link model: dcs-2121
vendor: d-link model: dcs-932l
vendor: d-link model: dcs-5222lb1
vendor: d-link model: camera stream client activex control
vendor: d-link model: dcs-5605
vendor: d-link model: dcs-825l
vendor: d-link model: dcs-5605 ptz
vendor: d-link model: dcs-2103 firmware
vendor: d-link model: dcs-1130
vendor: d-link model: dcs-8000lh
vendor: d-link model: dcs-900 internet camera
vendor: d-link model: dcs-820l
vendor: d-link model: dcs-5020l
vendor: d-link model: dcs-900
vendor: d-link model: dcs-855l
vendor: d-link model: dcs-2630l
vendor: d-link model: dcs-942lb1
vendor: d-link model: dcs-2103
vendor: jooan model: ip camera a5
vendor: intellinet model: nfc-30ir ip camera firmware
vendor: intellinet model: nfc-30ir ip camera
vendor: intellinet model: nfc-30ir
vendor: cisco model: 1100
vendor: cisco model: video surveillance 2500 series ip camera
vendor: cisco model: video surveillance 2500 series
vendor: cisco model: series
vendor: cisco model: cisco video surveillance 2500 series
vendor: cisco model: series ip camera
vendor: cisco model: cisco video surveillance 2500 series ip camera
vendor: cisco model: video surveillance 2500
vendor: cisco model: nexus
vendor: ichano model: athome ip camera
vendor: trendnet model: ip camera
vendor: edimax model: ic-3140w
vendor: edimax model: plug
db: NVD ids: CVE-2013-1594, CVE-2020-3506, CVE-2014-9238, CVE-2023-30352, CVE-2018-11560, CVE-2017-9391, CVE-2019-25062, CVE-2010-4230, CVE-2018-11654, CVE-2019-10711, CVE-2023-6248, CVE-2020-19643, CVE-2017-5173, CVE-2013-3541, CVE-2017-9392, CVE-2018-9156, CVE-2022-31873, CVE-2023-39509, CVE-2018-9158, CVE-2013-3540, CVE-2021-23852, CVE-2017-18377, CVE-2012-4046, CVE-2020-27542, CVE-2017-8225, CVE-2017-5174, CVE-2020-7879, CVE-2018-17240, CVE-2017-8224, CVE-2019-7315, CVE-2020-11623, CVE-2013-5535, CVE-2023-30356, CVE-2013-3687, CVE-2017-17761, CVE-2013-3690, CVE-2020-3544, CVE-2013-3963, CVE-2013-3311, CVE-2018-11653, CVE-2013-2574, CVE-2013-3539, CVE-2020-19642, CVE-2018-20342, CVE-2017-8221, CVE-2021-30166, CVE-2020-11624, CVE-2020-7057, CVE-2013-7204, CVE-2017-16566, CVE-2021-23847, CVE-2007-5214, CVE-2023-30351, CVE-2019-14457, CVE-2021-41506, CVE-2019-25063, CVE-2017-17101, CVE-2017-5674, CVE-2022-28743, CVE-2021-23850, CVE-2013-1596, CVE-2018-6479, CVE-2010-4231, CVE-2023-0773, CVE-2014-9234, CVE-2020-19641, CVE-2017-8405, CVE-2022-41677, CVE-2013-4977, CVE-2013-3314, CVE-2017-5675, CVE-2023-6118, CVE-2014-9517, CVE-2021-4045, CVE-2017-11634, CVE-2014-3895, CVE-2018-12640, CVE-2019-9676, CVE-2013-5215, CVE-2017-9315, CVE-2022-34138, CVE-2013-3689, CVE-2013-1595, CVE-2023-30354, CVE-2013-3313, CVE-2018-18441, CVE-2018-3867, CVE-2023-31995, CVE-2017-8222, CVE-2021-1131, CVE-2017-11632, CVE-2013-4975, CVE-2023-30353, CVE-2022-31875, CVE-2012-5306, CVE-2009-2046, CVE-2021-23851, CVE-2017-8223, CVE-2010-4232, CVE-2019-20463, CVE-2021-26611, CVE-2017-3223, CVE-2020-26762, CVE-2010-4233, CVE-2019-14458, CVE-2019-18382, CVE-2021-45039, CVE-2020-19640, CVE-2020-11625, CVE-2023-31996, CVE-2007-5212, CVE-2020-3110, CVE-2017-11633, CVE-2023-31994, CVE-2017-11635, CVE-2021-23848, CVE-2022-23382, CVE-2013-3312, CVE-2013-4976, CVE-2013-3962, CVE-2018-9157, CVE-2016-9155, CVE-2017-7461, CVE-2007-5213, CVE-2021-1521, CVE-2020-3507, CVE-2017-7253, CVE-2013-3686, CVE-2014-1849, CVE-2017-7462, CVE-2020-7848, CVE-2014-0673, CVE-2010-4234, CVE-2004-1650, CVE-2020-19639, CVE-2023-30146

Trust: 4.0

Fetched: Jan. 9, 2024, 9:59 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: command injection
Affected productsExternal IDs
db: NVD ids: CVE-2021-27561
Related entries in the VARIoT vulnerabilities database: VAR-201810-1413, VAR-202102-0157, VAR-201808-0455, VAR-200412-0263, VAR-201901-1500, VAR-201206-0202

Trust: 5.5

Fetched: Jan. 9, 2024, 9:48 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, connection slot exhaustion, denial of service...
Affected productsExternal IDs
vendor: matt model: dropbear ssh server
vendor: matt model: dropbear ssh
vendor: supermicro model: intelligent platform management interface
vendor: supermicro model: intelligent platform management
vendor: filezilla model: server
vendor: auto-maskin model: dcu-210e
vendor: auto-maskin model: dcu 210e
vendor: auto-maskin model: dcu 210e firmware
vendor: proftpd model: proftpd
vendor: node.js model: node.js
vendor: mofi model: mofi4500-4gxelte
vendor: mofi model: network mofi4500-4gxelte 4.1.5-std
vendor: matt johnston model: dropbear ssh server
vendor: matt johnston model: dropbear ssh
vendor: dropbear model: ssh server
vendor: dropbear model: dropbear ssh
vendor: netgate model: pfsense
db: NVD ids: CVE-2018-5399, CVE-2016-7407, CVE-2017-9079, CVE-2013-3619, CVE-2023-0344, CVE-2021-36369, CVE-2017-2659, CVE-2020-15833, CVE-2016-3115, CVE-2023-48795, CVE-2018-15599, CVE-2016-7409, CVE-2005-4178, CVE-2016-7408, CVE-2018-15473, CVE-2013-4421, CVE-2004-2486, CVE-2020-36254, CVE-2022-28369, CVE-2018-20685, CVE-2006-1206, CVE-2019-12953, CVE-2013-4434, CVE-2017-9078, CVE-2006-0225, CVE-2016-7406, CVE-2007-1099, CVE-2016-3116, CVE-2012-0920

Trust: 4.25

Fetched: Jan. 9, 2024, 9:47 a.m., Published: Dec. 19, 2023, midnight
Vulnerabilities: use after free
Affected productsExternal IDs
db: NVD ids: CVE-2022-30539

Trust: 3.75

Fetched: Jan. 9, 2024, 9:45 a.m., Published: Dec. 13, 2023, 5:01 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs