VARIoT news about IoT security

Trust: 5.25

Fetched: Aug. 9, 2023, 9:40 a.m., Published: Aug. 7, 2023, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: google model: android

Trust: 3.75

Fetched: Aug. 9, 2023, 9:40 a.m., Published: Aug. 8, 2023, midnight
Vulnerabilities: value injection
Affected productsExternal IDs
db: NVD ids: CVE-2022-40982

Trust: 3.25

Fetched: Aug. 9, 2023, 9:39 a.m., Published: Aug. 8, 2023, 11:08 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: email security appliance

Trust: 5.25

Fetched: Aug. 9, 2023, 9:38 a.m., Published: Aug. 9, 2023, midnight
Vulnerabilities: denial of service, code execution, information disclosure
Affected productsExternal IDs
vendor: huawei model: huawei
vendor: motorola model: motorola
vendor: motorola model: android
vendor: samsung model: notes
vendor: samsung model: mobile
vendor: google model: pixel
vendor: google model: android
vendor: google model: wifi
db: NVD ids: CVE-2023-21271, CVE-2023-21278, CVE-2023-21281, CVE-2023-21283, CVE-2023-21274, CVE-2023-21276, CVE-2023-21269, CVE-2023-21265, CVE-2023-21277, CVE-2023-21284, CVE-2023-22666, CVE-2023-21286, CVE-2023-21273, CVE-2023-21290, CVE-2020-29374, CVE-2022-40510, CVE-2023-21132, CVE-2023-21270, CVE-2023-21280, CVE-2023-21285, CVE-2022-34830, CVE-2023-21268, CVE-2023-21287, CVE-2023-20965, CVE-2023-28555, CVE-2023-21267, CVE-2023-21275, CVE-2023-21133, CVE-2023-21626, CVE-2023-21264, CVE-2023-20780, CVE-2023-21289, CVE-2023-21282, CVE-2023-21292, CVE-2023-21288, CVE-2023-21140, CVE-2023-21279, CVE-2023-28537, CVE-2023-21242, CVE-2023-21134, CVE-2023-21272

Trust: 5.25

Fetched: Aug. 9, 2023, 9:35 a.m., Published: Aug. 9, 2023, 9:35 a.m.
Vulnerabilities: open redirect vulnerability, information disclosure, brute force attack...
Affected productsExternal IDs
vendor: asus model: rt-n12e b1
vendor: asus model: rt-ac1200gu
vendor: asus model: rt-n16
vendor: asus model: rt-ac58u
vendor: asus model: dsl-n55u_c1
vendor: asus model: dsl-ac55u
vendor: asus model: rt-ac88u firmware
vendor: asus model: dsl-ac68u
vendor: asus model: rt-ac1900
vendor: asus model: rt-ac1750_b1
vendor: asus model: aura sync
vendor: asus model: rt-ac66u b1
vendor: asus model: zenfone
vendor: asus model: esc4000 g4
vendor: asus model: dsl-n16
vendor: asus model: rt-n12hp
vendor: asus model: dsl-ac87vg
vendor: asus model: router
vendor: asus model: dsl-n10_c1
vendor: asus model: rt-ac2900
vendor: asus model: bmc firmware
vendor: asus model: rt-ac5300
vendor: asus model: rt-ac66w
vendor: asus model: rt-n65u
vendor: asus model: rt-ac1200g
vendor: asus model: rt-ac88u
vendor: asus model: gt-ac5300
vendor: asus model: rt-n10e
vendor: asus model: rs700-e9-rs12
vendor: asus model: rt-n66u
vendor: asus model: rt-ac68p
vendor: asus model: rt-ac86u
vendor: asus model: rt-n14uhp
vendor: asus model: esc8000 g4
vendor: asus model: rt-ac85u
vendor: asus model: tuf-ax3000
vendor: asus model: rs700a-e9-rs4v2
vendor: asus model: ea-n66
vendor: asus model: asus
vendor: asus model: rt-ac68r
vendor: asus model: rt-ac87r
vendor: asus model: rt-acrh13
vendor: asus model: rt-ac750
vendor: asus model: rt-n300
vendor: asus model: rt-ac1300uhp
vendor: asus model: rp-ac56
vendor: asus model: rt-n12hp b1
vendor: asus model: dsl-n17u
vendor: asus model: dsl-n12e_c1
vendor: asus model: rt-n56u b1
vendor: asus model: rp-n53
vendor: asus model: asmb9-ikvm
vendor: asus model: rt-ac3100 firmware
vendor: asus model: dsl-n55u
vendor: asus model: 4g-ac68u
vendor: asus model: rt-n600
vendor: asus model: rt-ac1200hp
vendor: asus model: rt-ax88u
vendor: asus model: rt-ac3100
vendor: asus model: dsl-ac52u
vendor: asus model: rs720-e9-rs12-e
vendor: asus model: rt-ac1750
vendor: asus model: rt-ax3000
vendor: asus model: ikvm
vendor: asus model: brt-ac828
vendor: asus model: dsl-ac68r
vendor: asus model: rt-ac66r
vendor: asus model: rp-ac52
vendor: asus model: rt-ac52u
vendor: asus model: rt-ac56s
vendor: asus model: rt-ac56u
vendor: asus model: rt-ac1200
vendor: asus model: rt-ac53u
vendor: asus model: rt-ac66u
vendor: asus model: asmb8-ikvm
vendor: asus model: rs700-e9-rs4
vendor: asus model: rt-n66r
vendor: asus model: rt-ac2900 firmware
vendor: asus model: rt-ac1900p
vendor: asus model: dsl-n55u d1
vendor: asus model: rt-ac68uf
vendor: asus model: rt-n12
vendor: asus model: rt-ac53
vendor: asus model: rt-n12 d1
vendor: asus model: rt-n18u
vendor: asus model: wireless routers
vendor: asus model: rt-ac1900u
vendor: asus model: rt-ac52u_b1
vendor: asus model: rt-ac68u
vendor: asus model: rt-n12e_b1
vendor: asus model: rt-n12hp_b1
vendor: asus model: rt-ac54u
vendor: asus model: rt-ac5300 firmware
vendor: asus model: rt-n10
vendor: asus model: rt-n56u
vendor: asus model: rp-n12
vendor: asus model: rt-n66w
vendor: asus model: dsl-n14u
vendor: asus model: rt-ac66u_b1
vendor: asus model: rt-ac55uhp
vendor: asus model: rp-n14
vendor: asus model: rs720a-e9-rs24v2
vendor: asus model: rs500a-e10-rs4
vendor: asus model: rt-ac3200
vendor: asus model: rt-n14u
vendor: asus model: rs700a-e9-rs12v2
vendor: asus model: gt-ac5300 firmware
vendor: asus model: rt-ac51u
vendor: asus model: esc4000 g4x
vendor: asus model: rs500a-e10-ps4
vendor: asus model: dsl-n16u
vendor: asus model: rt-ac86u firmware
vendor: asus model: dsl-ac56u
vendor: asus model: rt-n10u
vendor: asus model: rt-n66u_c1
vendor: asus model: gt-ac2900
vendor: asus model: rs720a-e9-rs12v2
vendor: asus model: rt-n11p
vendor: asus model: rt-acrh17
vendor: asus model: asuswrt
vendor: asus model: rt-ac55u
vendor: asus model: rt-ac68w
vendor: asus model: rt-ax86u
vendor: asus model: rt-ac87
vendor: asus model: routers
vendor: asus model: rt-ac56r
vendor: asus model: rt-ac87u
vendor: google model: wifi router
vendor: google model: android
vendor: google model: wi-fi router
vendor: google model: home
vendor: google model: wifi
vendor: asuswrt model: rt-n12e b1
vendor: asuswrt model: rt-ac1200gu
vendor: asuswrt model: rt-n16
vendor: asuswrt model: rt-ac58u
vendor: asuswrt model: dsl-n55u_c1
vendor: asuswrt model: dsl-ac55u
vendor: asuswrt model: rt-ac88u firmware
vendor: asuswrt model: dsl-ac68u
vendor: asuswrt model: rt-ac1900
vendor: asuswrt model: rt-ac1750_b1
vendor: asuswrt model: aura sync
vendor: asuswrt model: rt-ac66u b1
vendor: asuswrt model: zenfone
vendor: asuswrt model: esc4000 g4
vendor: asuswrt model: dsl-n16
vendor: asuswrt model: rt-n12hp
vendor: asuswrt model: dsl-ac87vg
vendor: asuswrt model: router
vendor: asuswrt model: dsl-n10_c1
vendor: asuswrt model: rt-ac2900
vendor: asuswrt model: bmc firmware
vendor: asuswrt model: rt-ac5300
vendor: asuswrt model: rt-ac66w
vendor: asuswrt model: rt-n65u
vendor: asuswrt model: rt-ac1200g
vendor: asuswrt model: rt-ac88u
vendor: asuswrt model: gt-ac5300
vendor: asuswrt model: rt-n10e
vendor: asuswrt model: rs700-e9-rs12
vendor: asuswrt model: rt-n66u
vendor: asuswrt model: rt-ac68p
vendor: asuswrt model: rt-ac86u
vendor: asuswrt model: rt-n14uhp
vendor: asuswrt model: esc8000 g4
vendor: asuswrt model: rt-ac85u
vendor: asuswrt model: tuf-ax3000
vendor: asuswrt model: rs700a-e9-rs4v2
vendor: asuswrt model: ea-n66
vendor: asuswrt model: asus
vendor: asuswrt model: rt-ac68r
vendor: asuswrt model: rt-ac87r
vendor: asuswrt model: rt-acrh13
vendor: asuswrt model: rt-ac750
vendor: asuswrt model: rt-n300
vendor: asuswrt model: rt-ac1300uhp
vendor: asuswrt model: rp-ac56
vendor: asuswrt model: rt-n12hp b1
vendor: asuswrt model: dsl-n17u
vendor: asuswrt model: dsl-n12e_c1
vendor: asuswrt model: rt-n56u b1
vendor: asuswrt model: rp-n53
vendor: asuswrt model: asmb9-ikvm
vendor: asuswrt model: rt-ac3100 firmware
vendor: asuswrt model: dsl-n55u
vendor: asuswrt model: 4g-ac68u
vendor: asuswrt model: rt-n600
vendor: asuswrt model: rt-ac1200hp
vendor: asuswrt model: rt-ax88u
vendor: asuswrt model: rt-ac3100
vendor: asuswrt model: dsl-ac52u
vendor: asuswrt model: rs720-e9-rs12-e
vendor: asuswrt model: rt-ac1750
vendor: asuswrt model: rt-ax3000
vendor: asuswrt model: ikvm
vendor: asuswrt model: brt-ac828
vendor: asuswrt model: dsl-ac68r
vendor: asuswrt model: rt-ac66r
vendor: asuswrt model: rp-ac52
vendor: asuswrt model: rt-ac52u
vendor: asuswrt model: rt-ac56s
vendor: asuswrt model: rt-ac56u
vendor: asuswrt model: rt-ac1200
vendor: asuswrt model: rt-ac53u
vendor: asuswrt model: rt-ac66u
vendor: asuswrt model: asmb8-ikvm
vendor: asuswrt model: rs700-e9-rs4
vendor: asuswrt model: rt-n66r
vendor: asuswrt model: rt-ac2900 firmware
vendor: asuswrt model: rt-ac1900p
vendor: asuswrt model: dsl-n55u d1
vendor: asuswrt model: rt-ac68uf
vendor: asuswrt model: rt-n12
vendor: asuswrt model: rt-ac53
vendor: asuswrt model: rt-n12 d1
vendor: asuswrt model: rt-n18u
vendor: asuswrt model: wireless routers
vendor: asuswrt model: rt-ac1900u
vendor: asuswrt model: rt-ac52u_b1
vendor: asuswrt model: rt-ac68u
vendor: asuswrt model: rt-n12e_b1
vendor: asuswrt model: rt-n12hp_b1
vendor: asuswrt model: rt-ac54u
vendor: asuswrt model: rt-ac5300 firmware
vendor: asuswrt model: rt-n10
vendor: asuswrt model: rt-n56u
vendor: asuswrt model: rp-n12
vendor: asuswrt model: rt-n66w
vendor: asuswrt model: dsl-n14u
vendor: asuswrt model: rt-ac66u_b1
vendor: asuswrt model: rt-ac55uhp
vendor: asuswrt model: rp-n14
vendor: asuswrt model: rs720a-e9-rs24v2
vendor: asuswrt model: rs500a-e10-rs4
vendor: asuswrt model: rt-ac3200
vendor: asuswrt model: rt-n14u
vendor: asuswrt model: rs700a-e9-rs12v2
vendor: asuswrt model: gt-ac5300 firmware
vendor: asuswrt model: rt-ac51u
vendor: asuswrt model: esc4000 g4x
vendor: asuswrt model: rs500a-e10-ps4
vendor: asuswrt model: dsl-n16u
vendor: asuswrt model: rt-ac86u firmware
vendor: asuswrt model: dsl-ac56u
vendor: asuswrt model: rt-n10u
vendor: asuswrt model: rt-n66u_c1
vendor: asuswrt model: gt-ac2900
vendor: asuswrt model: rs720a-e9-rs12v2
vendor: asuswrt model: rt-n11p
vendor: asuswrt model: rt-acrh17
vendor: asuswrt model: asuswrt
vendor: asuswrt model: rt-ac55u
vendor: asuswrt model: rt-ac68w
vendor: asuswrt model: rt-ax86u
vendor: asuswrt model: rt-ac87
vendor: asuswrt model: routers
vendor: asuswrt model: rt-ac56r
vendor: asuswrt model: rt-ac87u
vendor: moonlight model: moonlight
vendor: trend micro model: antivirus
vendor: trend micro model: security
vendor: trend model: antivirus
vendor: trend model: security
vendor: asustek model: rt-n12e b1
vendor: asustek model: rt-ac1200gu
vendor: asustek model: rt-n16
vendor: asustek model: rt-ac58u
vendor: asustek model: dsl-n55u_c1
vendor: asustek model: dsl-ac55u
vendor: asustek model: rt-ac88u firmware
vendor: asustek model: dsl-ac68u
vendor: asustek model: rt-ac1900
vendor: asustek model: rt-ac1750_b1
vendor: asustek model: aura sync
vendor: asustek model: rt-ac66u b1
vendor: asustek model: zenfone
vendor: asustek model: esc4000 g4
vendor: asustek model: dsl-n16
vendor: asustek model: rt-n12hp
vendor: asustek model: dsl-ac87vg
vendor: asustek model: router
vendor: asustek model: dsl-n10_c1
vendor: asustek model: rt-ac2900
vendor: asustek model: bmc firmware
vendor: asustek model: rt-ac5300
vendor: asustek model: rt-ac66w
vendor: asustek model: rt-n65u
vendor: asustek model: rt-ac1200g
vendor: asustek model: rt-ac88u
vendor: asustek model: gt-ac5300
vendor: asustek model: rt-n10e
vendor: asustek model: rs700-e9-rs12
vendor: asustek model: rt-n66u
vendor: asustek model: rt-ac68p
vendor: asustek model: rt-ac86u
vendor: asustek model: rt-n14uhp
vendor: asustek model: esc8000 g4
vendor: asustek model: rt-ac85u
vendor: asustek model: tuf-ax3000
vendor: asustek model: rs700a-e9-rs4v2
vendor: asustek model: ea-n66
vendor: asustek model: asus
vendor: asustek model: rt-ac68r
vendor: asustek model: rt-ac87r
vendor: asustek model: rt-acrh13
vendor: asustek model: rt-ac750
vendor: asustek model: rt-n300
vendor: asustek model: rt-ac1300uhp
vendor: asustek model: rp-ac56
vendor: asustek model: rt-n12hp b1
vendor: asustek model: dsl-n17u
vendor: asustek model: dsl-n12e_c1
vendor: asustek model: rt-n56u b1
vendor: asustek model: rp-n53
vendor: asustek model: asmb9-ikvm
vendor: asustek model: rt-ac3100 firmware
vendor: asustek model: dsl-n55u
vendor: asustek model: 4g-ac68u
vendor: asustek model: rt-n600
vendor: asustek model: rt-ac1200hp
vendor: asustek model: rt-ax88u
vendor: asustek model: rt-ac3100
vendor: asustek model: dsl-ac52u
vendor: asustek model: rs720-e9-rs12-e
vendor: asustek model: rt-ac1750
vendor: asustek model: rt-ax3000
vendor: asustek model: ikvm
vendor: asustek model: brt-ac828
vendor: asustek model: dsl-ac68r
vendor: asustek model: rt-ac66r
vendor: asustek model: rp-ac52
vendor: asustek model: rt-ac52u
vendor: asustek model: rt-ac56s
vendor: asustek model: rt-ac56u
vendor: asustek model: rt-ac1200
vendor: asustek model: rt-ac53u
vendor: asustek model: rt-ac66u
vendor: asustek model: asmb8-ikvm
vendor: asustek model: rs700-e9-rs4
vendor: asustek model: rt-n66r
vendor: asustek model: rt-ac2900 firmware
vendor: asustek model: rt-ac1900p
vendor: asustek model: dsl-n55u d1
vendor: asustek model: rt-ac68uf
vendor: asustek model: rt-n12
vendor: asustek model: rt-ac53
vendor: asustek model: rt-n12 d1
vendor: asustek model: rt-n18u
vendor: asustek model: wireless routers
vendor: asustek model: rt-ac1900u
vendor: asustek model: rt-ac52u_b1
vendor: asustek model: rt-ac68u
vendor: asustek model: rt-n12e_b1
vendor: asustek model: rt-n12hp_b1
vendor: asustek model: rt-ac54u
vendor: asustek model: rt-ac5300 firmware
vendor: asustek model: rt-n10
vendor: asustek model: rt-n56u
vendor: asustek model: rp-n12
vendor: asustek model: rt-n66w
vendor: asustek model: dsl-n14u
vendor: asustek model: rt-ac66u_b1
vendor: asustek model: rt-ac55uhp
vendor: asustek model: rp-n14
vendor: asustek model: rs720a-e9-rs24v2
vendor: asustek model: rs500a-e10-rs4
vendor: asustek model: rt-ac3200
vendor: asustek model: rt-n14u
vendor: asustek model: rs700a-e9-rs12v2
vendor: asustek model: gt-ac5300 firmware
vendor: asustek model: rt-ac51u
vendor: asustek model: esc4000 g4x
vendor: asustek model: rs500a-e10-ps4
vendor: asustek model: dsl-n16u
vendor: asustek model: rt-ac86u firmware
vendor: asustek model: dsl-ac56u
vendor: asustek model: rt-n10u
vendor: asustek model: rt-n66u_c1
vendor: asustek model: gt-ac2900
vendor: asustek model: rs720a-e9-rs12v2
vendor: asustek model: rt-n11p
vendor: asustek model: rt-acrh17
vendor: asustek model: asuswrt
vendor: asustek model: rt-ac55u
vendor: asustek model: rt-ac68w
vendor: asustek model: rt-ax86u
vendor: asustek model: rt-ac87
vendor: asustek model: routers
vendor: asustek model: rt-ac56r
vendor: asustek model: rt-ac87u
db: NVD ids: CVE-2018-1160, CVE-2017-13086, CVE-2017-6519, CVE-2022-40259, CVE-2021-28186, CVE-2021-42055, CVE-2023-31195, CVE-2021-28176, CVE-2020-25685, CVE-2021-28195, CVE-2021-28201, CVE-2019-19052, CVE-2015-8041, CVE-2020-25782, CVE-2020-10649, CVE-2021-28206, CVE-2019-9495, CVE-2021-28205, CVE-2021-28188, CVE-2020-25643, CVE-2019-9499, CVE-2018-16839, CVE-2022-35401, CVE-2020-15078, CVE-2019-15126, CVE-2020-26146, CVE-2018-6000, CVE-2021-28207, CVE-2021-28187, CVE-2021-28191, CVE-2021-28200, CVE-2021-28182, CVE-2021-28183, CVE-2018-1000120, CVE-2018-5999, CVE-2020-26144, CVE-2021-28180, CVE-2020-8169, CVE-2016-2148, CVE-2019-16275, CVE-2022-38699, CVE-2021-28194, CVE-2021-30004, CVE-2020-14305, CVE-2023-28703, CVE-2021-28204, CVE-2020-25682, CVE-2021-27803, CVE-2019-19235, CVE-2019-9496, CVE-2020-25686, CVE-2022-46871, CVE-2022-36438, CVE-2022-38393, CVE-2022-40242, CVE-2021-26943, CVE-2018-18287, CVE-2021-41435, CVE-2021-28190, CVE-2022-2827, CVE-2022-26673, CVE-2021-28209, CVE-2022-26674, CVE-2017-13084, CVE-2022-26669, CVE-2022-38105, CVE-2019-11555, CVE-2022-22814, CVE-2023-28702, CVE-2022-21933, CVE-2021-28197, CVE-2021-28179, CVE-2021-28189, CVE-2021-28181, CVE-2021-28185, CVE-2020-24587, CVE-2021-28196, CVE-2021-28202, CVE-2021-28199, CVE-2019-5481, CVE-2020-25681, CVE-2022-26376, CVE-2021-28177, CVE-2020-25687, CVE-2020-25683, CVE-2017-13082, CVE-2019-5482, CVE-2021-28203, CVE-2021-28192, CVE-2021-28178, CVE-2022-26668, CVE-2020-23648, CVE-2020-24588, CVE-2019-9498, CVE-2021-28193, CVE-2021-28175, CVE-2016-6301, CVE-2021-28208, CVE-2016-4476, CVE-2021-44228, CVE-2018-19052, CVE-2021-41436, CVE-2022-36439, CVE-2019-9497, CVE-2020-25684, CVE-2020-11810, CVE-2019-9494, CVE-2020-15009, CVE-2021-28184, CVE-2021-28198, CVE-2020-27827

Trust: 5.25

Fetched: Aug. 9, 2023, 9:33 a.m., Published: Aug. 2, 2023, noon
Vulnerabilities: privilege escalation, command injection, information disclosure...
Affected productsExternal IDs
vendor: kcodes model: netusb
vendor: kcodes model: netusb.ko
vendor: asus model: asuswrt-merlin
vendor: asus model: router
vendor: asus model: asus
vendor: asus model: wireless routers
vendor: asus model: asuswrt
vendor: asus model: routers
vendor: asuswrt-merlin model: asuswrt-merlin
vendor: asuswrt-merlin model: router
vendor: asuswrt-merlin model: asus
vendor: asuswrt-merlin model: wireless routers
vendor: asuswrt-merlin model: asuswrt
vendor: asuswrt-merlin model: routers
vendor: synology model: router manager
vendor: synology model: synology router manager
vendor: cisco model: e1200
vendor: cisco model: series routers
vendor: cisco model: router
vendor: cisco model: small business
vendor: cisco model: industrial router
vendor: cisco model: e2500
vendor: cisco model: soho
vendor: cisco model: series
vendor: cisco model: linksys
vendor: cisco model: routers
vendor: netgear model: rbr750
vendor: netgear model: router
vendor: netgear model: multiple routers
vendor: netgear model: rbs750
vendor: netgear model: orbi
vendor: netgear model: r7900
vendor: netgear model: netusb.ko
vendor: netgear model: r8000
vendor: snort model: snort
vendor: tp-link model: tl-r600vpn
vendor: tp-link model: gateway
vendor: tp-link model: routers
vendor: mesh model: mesh
vendor: asuswrt model: asuswrt-merlin
vendor: asuswrt model: router
vendor: asuswrt model: asus
vendor: asuswrt model: wireless routers
vendor: asuswrt model: asuswrt
vendor: asuswrt model: routers
vendor: d-link model: router
vendor: d-link model: multiple routers
vendor: d-link model: dir-3040
vendor: linksys model: e1200
vendor: linksys model: e2500

Trust: 3.0

Fetched: Aug. 9, 2023, 9:32 a.m., Published: Aug. 2, 2023, 4:05 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-35078, CVE-2023-35082, CVE-2023-35081

Trust: 3.75

Fetched: Aug. 9, 2023, 9:32 a.m., Published: Jan. 10, 2022, midnight
Vulnerabilities: denial of service, injection attack
Affected productsExternal IDs

Trust: 4.25

Fetched: Aug. 9, 2023, 9:31 a.m., Published: Aug. 7, 2023, 6:54 p.m.
Vulnerabilities: denial of service, code execution, path traversal
Affected productsExternal IDs
vendor: trend model: security
vendor: trend micro model: security
db: NVD ids: CVE-2023-27350, CVE-2023-3486, CVE-2023-39143

Trust: 5.5

Fetched: Aug. 9, 2023, 9:30 a.m., Published: Aug. 7, 2023, 10:41 a.m.
Vulnerabilities: code execution, path traversal
Affected productsExternal IDs
vendor: trend model: security
vendor: trend micro model: security
db: NVD ids: CVE-2023-27350, CVE-2023-3486, CVE-2023-39143
Related entries in the VARIoT vulnerabilities database: VAR-202201-1068, VAR-202201-1063, VAR-202201-1730

Trust: 5.5

Fetched: Aug. 9, 2023, 9:24 a.m., Published: -
Vulnerabilities: privilege escalation, format string vulnerability, buffer overflow...
Affected productsExternal IDs
vendor: huawei model: huawei
db: NVD ids: CVE-2023-34164, CVE-2021-40032, CVE-2023-37240, CVE-2022-48516, CVE-2022-48520, CVE-2022-48512, CVE-2022-48513, CVE-2022-48514, CVE-2023-1695, CVE-2021-46894, CVE-2022-48511, CVE-2021-40027, CVE-2023-37238, CVE-2021-46892, CVE-2022-48518, CVE-2022-48507, CVE-2022-48515, CVE-2021-46893, CVE-2022-48517, CVE-2022-48509, CVE-2023-1691, CVE-2023-37239, CVE-2023-37245, CVE-2021-46890, CVE-2022-48510, CVE-2021-40014, CVE-2022-48519, CVE-2023-3455, CVE-2023-37241, CVE-2021-46891, CVE-2023-3456, CVE-2022-48508, CVE-2023-37242

Trust: 5.25

Fetched: Aug. 9, 2023, 9:22 a.m., Published: Aug. 9, 2022, midnight
Vulnerabilities: privilege escalation, security feature bypass, sql injection...
Affected productsExternal IDs
vendor: zoho model: manageengine adselfservice plus
vendor: citrix model: sd-wan
vendor: citrix model: netscaler adc
vendor: citrix model: application delivery controller
vendor: citrix model: netscaler gateway
vendor: citrix model: sd-wan wanop
vendor: citrix model: netscaler
vendor: citrix model: gateway
vendor: sonicwall model: ssl-vpn
vendor: sonicwall model: email security
vendor: sonicwall model: sma 100
vendor: sonicwall model: sma100
vendor: sonicwall model: analyzer
vendor: sonicwall model: ssl vpn
vendor: pulse secure model: policy secure
vendor: pulse secure model: connect secure
vendor: pulse secure model: pulse connect secure
vendor: pulse secure model: pulse policy secure
vendor: pulse model: secure pulse connect secure
vendor: wso2 model: application server
vendor: wso2 model: enterprise integrator
vendor: wso2 model: identity server
vendor: wso2 model: wso2 enterprise integrator
vendor: wso2 model: wso2 identity server
vendor: wso2 model: api manager
vendor: wso2 model: identity server analytics
vendor: wso2 model: wso2 api manager
vendor: qnap model: photo station
db: NVD ids: CVE-2022-22954, CVE-2022-1388, CVE-2021-26855, CVE-2022-42475, CVE-2021-34523, CVE-2021-20038, CVE-2021-26084, CVE-2022-22960, CVE-2021-20016, CVE-2021-26858, CVE-2019-11510, CVE-2019-0708, CVE-2021-42013, CVE-2020-1472, CVE-2022-40684, CVE-2022-26134, CVE-2019-19781, CVE-2021-27065, CVE-2018-13379, CVE-2021-26857, CVE-2020-14883, CVE-2021-41773, CVE-2022-29464, CVE-2022-27924, CVE-2021-45046, CVE-2022-27593, CVE-2017-11882, CVE-2021-40539, CVE-2022-22963, CVE-2022-24682, CVE-2022-41082, CVE-2017-0199, CVE-2022-22047, CVE-2021-40438, CVE-2021-31207, CVE-2021-34473, CVE-2022-22536, CVE-2022-30190, CVE-2020-14882, CVE-2020-5902, CVE-2021-20021

Trust: 3.25

Fetched: Aug. 9, 2023, 9:22 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-35078, CVE-2023-35081
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:21 a.m., Published: Aug. 4, 2023, 5:15 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:21 a.m., Published: Aug. 4, 2023, 4:37 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:20 a.m., Published: Aug. 4, 2023, 4:08 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:20 a.m., Published: Aug. 4, 2023, 4:39 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974

Trust: 3.75

Fetched: Aug. 9, 2023, 9:19 a.m., Published: July 11, 2023, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-36664

Trust: 5.25

Fetched: Aug. 9, 2023, 9:19 a.m., Published: July 11, 2023, 4:43 p.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs

Trust: 4.25

Fetched: Aug. 9, 2023, 9:18 a.m., Published: June 13, 2023, midnight
Vulnerabilities: information disclosure
Affected productsExternal IDs
db: NVD ids: CVE-2023-32019