VARIoT news about IoT security
Related entries in the VARIoT vulnerabilities database:
VAR-202505-1586 Trust: 4.25 Fetched: June 6, 2025, 9:41 a.m., Published: May 13, 2025, 9:38 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: June 6, 2025, 9:40 a.m., Published: June 4, 2025, midnight | Vulnerabilities: default credentials |
| Affected products | External IDs |
Trust: 6.0 Fetched: June 6, 2025, 9:40 a.m., Published: - | Vulnerabilities: command injection |
| Affected products | External IDs | ||||||||
|
|
Trust: 6.0 Fetched: June 6, 2025, 9:39 a.m., Published: May 15, 2025, 7:15 a.m. | Vulnerabilities: encryption vulnerability |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: June 6, 2025, 9:39 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: June 6, 2025, 9:39 a.m., Published: June 5, 2025, 8:56 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 4.0 Fetched: June 6, 2025, 9:33 a.m., Published: June 2, 2025, 8:37 a.m. | Vulnerabilities: buffer overflow, brute force attack, system crash... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 4.0 Fetched: June 6, 2025, 9:33 a.m., Published: June 4, 2025, 4:17 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.0 Fetched: June 6, 2025, 9:32 a.m., Published: June 4, 2025, 8:59 a.m. | Vulnerabilities: use after free |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.0 Fetched: June 6, 2025, 9:27 a.m., Published: June 6, 2025, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.5 Fetched: June 6, 2025, 9:26 a.m., Published: June 4, 2025, 10:24 a.m. | Vulnerabilities: memory corruption, authorization vulnerability, command execution... |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 3.75 Fetched: June 6, 2025, 9:26 a.m., Published: June 5, 2025, 7:09 p.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||
|
Trust: 4.75 Fetched: June 6, 2025, 9:26 a.m., Published: June 4, 2025, 3:54 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||
|
Trust: 4.75 Fetched: June 6, 2025, 9:25 a.m., Published: June 4, 2025, 10:27 a.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.25 Fetched: June 6, 2025, 9:24 a.m., Published: Aug. 17, 2023, 12:30 p.m. | Vulnerabilities: code execution, default credentials |
| Affected products | External IDs | ||||||||||||||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-202309-0729 Trust: 4.5 Fetched: June 6, 2025, 9:24 a.m., Published: June 4, 2025, midnight | Vulnerabilities: weak password |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.5 Fetched: June 6, 2025, 9:10 a.m., Published: May 6, 2025, midnight | Vulnerabilities: memory corruption, integer overflow, denial of service... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: June 6, 2025, 9:10 a.m., Published: May 13, 2025, 10:46 a.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 4.0 Fetched: June 6, 2025, 9:09 a.m., Published: June 4, 2025, 3:54 p.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||||||
|
Trust: 5.75 Fetched: June 6, 2025, 9:09 a.m., Published: June 5, 2025, 5:20 p.m. | Vulnerabilities: device impersonation |
| Affected products | External IDs | ||||||||||||||||
|
|