VARIoT news about IoT security
Trust: 4.0 Fetched: Feb. 20, 2026, 9:25 a.m., Published: Feb. 1, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.75 Fetched: Feb. 20, 2026, 9:25 a.m., Published: Feb. 15, 2026, 4:22 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 4.5 Fetched: Feb. 20, 2026, 9:24 a.m., Published: Feb. 19, 2026, 3:16 p.m. | Vulnerabilities: request forgery, command execution, path traversal |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.75 Fetched: Feb. 20, 2026, 9:23 a.m., Published: Feb. 18, 2026, 7:58 a.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
|
Trust: 3.25 Fetched: Feb. 20, 2026, 9:20 a.m., Published: Feb. 20, 2025, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.5 Fetched: Feb. 20, 2026, 9:19 a.m., Published: Feb. 18, 2026, midnight | Vulnerabilities: buffer overflow, code execution |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: Feb. 20, 2026, 9:19 a.m., Published: Feb. 18, 2026, midnight | Vulnerabilities: session hijacking, cross-site scripting |
| Affected products | External IDs | ||||
|
Trust: 6.0 Fetched: Feb. 20, 2026, 9:18 a.m., Published: Feb. 4, 2026, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 3.0 Fetched: Feb. 20, 2026, 9:09 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 18, 2026, 9:25 a.m., Published: Feb. 17, 2026, 12:29 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 18, 2026, 9:24 a.m., Published: Feb. 17, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.25 Fetched: Feb. 18, 2026, 9:24 a.m., Published: Feb. 16, 2026, 2 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 18, 2026, 9:23 a.m., Published: Feb. 16, 2026, 5:32 p.m. | Vulnerabilities: buffer overflow |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 18, 2026, 9:23 a.m., Published: Feb. 18, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 18, 2026, 9:22 a.m., Published: Jan. 23, 2026, 1:44 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 18, 2026, 9:21 a.m., Published: - | Vulnerabilities: sql injection, cross-site scripting |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 4.75 Fetched: Feb. 18, 2026, 9:21 a.m., Published: Feb. 11, 2026, 5:06 a.m. | Vulnerabilities: code execution, command injection, privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 18, 2026, 9:21 a.m., Published: Feb. 16, 2026, 2:33 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 18, 2026, 9:20 a.m., Published: Jan. 28, 2026, 5:52 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 18, 2026, 9:20 a.m., Published: Feb. 18, 2025, midnight | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||
|
|