VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-202104-0768

Trust: 5.75

Fetched: Jan. 14, 2024, 9:43 a.m., Published: Aug. 8, 2021, 5 p.m.
Vulnerabilities: path traversal
Affected productsExternal IDs
vendor: cisco model: router
vendor: cisco model: routers
vendor: netgear model: router
vendor: d-link model: router
vendor: asus model: router
vendor: asus model: routers
vendor: asus model: asus
vendor: tenda model: router
vendor: buffalo model: router
vendor: buffalo model: wsr-2533dhp3
vendor: buffalo model: buffalo wsr-2533dhpl2
vendor: buffalo model: wsr-2533dhpl2
db: NVD ids: CVE-2021-20090, CVE-2021-27562, CVE-2021-27561
Related entries in the VARIoT vulnerabilities database: VAR-202103-0773

Trust: 3.5

Fetched: Jan. 14, 2024, 9:37 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
vendor: cisco model: router
vendor: cisco model: ios xe software
db: NVD ids: CVE-2023-20198, CVE-2021-1435
Related entries in the VARIoT vulnerabilities database: VAR-202008-0805, VAR-201804-1021, VAR-202204-0751, VAR-201501-0220, VAR-201403-0212, VAR-201312-0249, VAR-201711-0371, VAR-201305-0162, VAR-201305-0163, VAR-201502-0121, VAR-201801-1054, VAR-202011-0732, VAR-201310-0512, VAR-202011-1340, VAR-202101-1033, VAR-201508-0505, VAR-201810-0633, VAR-201609-0383, VAR-201301-0347, VAR-201609-0389, VAR-201401-0154, VAR-201607-0429, VAR-202101-1016, VAR-202011-1021, VAR-202006-1141, VAR-201810-0592, VAR-201204-0214, VAR-202011-1019, VAR-201312-0257, VAR-201501-0333, VAR-201301-0349, VAR-201810-0311, VAR-201306-0170, VAR-201608-0246, VAR-201102-0307, VAR-202006-1155, VAR-201908-0540, VAR-201906-0294, VAR-201810-0601, VAR-201401-0354, VAR-201501-0334, VAR-201501-0331, VAR-202007-1025, VAR-202003-1183, VAR-201312-0253, VAR-201312-0250, VAR-201301-0348, VAR-201905-0508, VAR-202006-1133, VAR-201810-0591, VAR-201901-0363, VAR-201302-0169, VAR-202001-0502, VAR-202106-0914, VAR-201805-0522, VAR-201702-0790, VAR-202011-1339, VAR-201312-0258, VAR-201102-0308, VAR-201710-0660, VAR-202106-0912, VAR-202006-1142, VAR-201810-0606, VAR-201911-1322, VAR-202102-0473, VAR-201711-0381, VAR-201711-0377, VAR-201801-1061, VAR-202008-0799, VAR-201604-0545, VAR-201605-0386, VAR-201901-0353, VAR-202004-1243, VAR-201405-0478, VAR-201312-0261, VAR-201505-0100, VAR-201711-0383, VAR-201604-0564, VAR-201909-0658, VAR-201502-0126, VAR-201309-0034, VAR-200912-0440, VAR-201507-0510, VAR-201908-1961, VAR-202111-0402, VAR-201701-0720, VAR-201708-1338, VAR-201506-0297, VAR-201806-1039, VAR-201804-0660, VAR-201305-0014, VAR-201908-0547, VAR-202006-1135, VAR-201902-0455, VAR-201707-0956, VAR-202301-1033, VAR-201312-0260, VAR-201206-0111, VAR-201307-0210, VAR-201312-0284, VAR-201810-0588, VAR-201607-0427, VAR-201506-0300, VAR-201710-0661, VAR-201905-0536, VAR-201801-1060, VAR-201810-0586, VAR-201408-0163, VAR-201609-0390, VAR-201407-0375, VAR-202102-0548, VAR-202111-0400, VAR-202009-1115, VAR-201901-0364, VAR-201701-0723, VAR-201901-0362, VAR-201711-0358, VAR-201312-0255, VAR-201210-0316, VAR-201810-0627, VAR-202011-1235, VAR-201805-0523, VAR-202104-0892, VAR-202010-1022, VAR-201901-0593, VAR-201705-3670, VAR-201711-0360, VAR-202209-0491, VAR-201908-0541, VAR-201407-0366, VAR-201607-0430, VAR-200912-0438, VAR-202004-0682, VAR-201506-0296, VAR-201312-0259, VAR-202106-0903, VAR-202009-1153, VAR-202003-1180, VAR-200912-0441, VAR-200912-0443, VAR-201810-0589, VAR-201406-0310, VAR-201703-0714, VAR-201902-0448, VAR-201801-1055, VAR-201810-0631, VAR-201901-0352, VAR-201507-0506, VAR-201204-0213, VAR-201703-0891, VAR-201102-0052, VAR-201711-0382, VAR-201405-0480, VAR-201312-0251, VAR-202106-0901, VAR-201506-0298, VAR-201312-0458, VAR-202006-1111, VAR-201711-0374, VAR-201807-0432, VAR-201801-1062, VAR-202110-0582, VAR-201110-0222, VAR-201701-0725, VAR-201410-0061, VAR-201908-0542, VAR-201102-0309, VAR-201204-0212, VAR-201710-0080, VAR-201409-0064, VAR-201407-0367, VAR-202204-1470, VAR-202101-1034, VAR-201501-0336, VAR-201102-0310, VAR-202003-1181, VAR-201406-0304, VAR-202003-1185, VAR-201807-0427, VAR-201810-0632, VAR-201309-0032, VAR-201805-0499, VAR-202106-0900, VAR-201501-0332, VAR-201607-0431, VAR-201312-0457, VAR-201102-0053, VAR-201711-0379, VAR-201312-0252, VAR-201711-0380, VAR-201701-0722, VAR-201502-0125, VAR-201810-0587, VAR-201506-0295, VAR-201206-0109, VAR-202008-0832, VAR-201810-0590, VAR-201502-0127, VAR-201110-0449, VAR-201407-0368, VAR-201206-0110, VAR-201806-1040, VAR-201309-0031, VAR-201406-0312, VAR-201810-0629, VAR-201305-0117, VAR-201306-0137, VAR-202008-0833, VAR-201312-0459, VAR-201908-1009, VAR-201312-0248, VAR-201501-0223, VAR-202008-0817, VAR-201405-0474, VAR-202106-0915, VAR-201905-0509, VAR-201501-0337, VAR-201810-0630, VAR-201407-0374, VAR-201701-0721, VAR-201710-0636, VAR-202106-0916, VAR-201312-0254, VAR-202111-0401, VAR-202011-1012, VAR-201408-0152, VAR-200912-0439, VAR-201706-0585, VAR-201210-0317, VAR-201206-0108, VAR-201810-0625, VAR-201609-0381, VAR-201305-0118, VAR-201301-0152, VAR-201902-0458, VAR-201908-0854, VAR-202004-1237, VAR-202008-0820, VAR-201902-0445, VAR-201810-0628, VAR-201405-0481, VAR-201405-0479, VAR-202011-1013, VAR-202208-0240, VAR-201807-0431, VAR-202102-0578, VAR-201711-0376, VAR-201711-0370, VAR-201404-0564, VAR-201807-0426, VAR-201312-0256, VAR-201210-0318, VAR-201711-0359, VAR-201309-0035, VAR-201901-0358, VAR-202208-0238, VAR-201607-0428, VAR-201503-0171, VAR-202006-1134, VAR-201210-0313, VAR-201901-0354, VAR-201911-1776, VAR-201710-0662, VAR-202104-0452, VAR-201210-0314, VAR-200808-0182, VAR-201501-0335, VAR-201308-0092, VAR-201810-0331, VAR-201801-1059, VAR-201506-0252, VAR-201309-0033, VAR-201210-0315, VAR-201602-0050, VAR-202106-0911, VAR-202008-0798, VAR-202009-1173, VAR-200912-0442, VAR-201810-0624, VAR-201405-0477, VAR-201711-0378, VAR-201908-1010, VAR-201512-0417, VAR-201810-0300, VAR-201206-0112, VAR-201407-0369, VAR-202001-1197

Trust: 5.25

Fetched: Jan. 14, 2024, 9:32 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution, improper validation, sql injection...
Affected productsExternal IDs
vendor: cisco model: cisco spark
vendor: cisco model: cisco webex meetings server
vendor: cisco model: webex training center
vendor: cisco model: webex meetings server
vendor: cisco model: webex meetings desktop
vendor: cisco model: rv345p
vendor: cisco model: webex meeting manager
vendor: cisco model: webex social
vendor: cisco model: webex meeting server
vendor: cisco model: cisco webex meetings desktop
vendor: cisco model: cisco webex social
vendor: cisco model: download manager
vendor: cisco model: webex teams
vendor: cisco model: cisco webex business suite
vendor: cisco model: cisco webex sales center
vendor: cisco model: asr 1000
vendor: cisco model: cisco webex meetings online
vendor: cisco model: rv340
vendor: cisco model: webex player
vendor: cisco model: cisco intelligent proximity
vendor: cisco model: webex meetings online
vendor: cisco model: cisco webex meetmenow
vendor: cisco model: webex sales center
vendor: cisco model: webex extension
vendor: cisco model: routers
vendor: cisco model: webex meetings desktop app
vendor: cisco model: webex meetings
vendor: cisco model: webex meetings player t29
vendor: cisco model: webex video mesh
vendor: cisco model: intelligent proximity
vendor: cisco model: webex
vendor: cisco model: link layer discovery protocol
vendor: cisco model: webex productivity tools
vendor: cisco model: meeting
vendor: cisco model: rv345
vendor: cisco model: cisco webex extension
vendor: cisco model: webex business suite
vendor: cisco model: gpccontainer class activex control
vendor: cisco model: cisco webex teams
vendor: cisco model: series
vendor: cisco model: meetings server
vendor: cisco model: cisco webex meeting center
vendor: cisco model: cisco webex connect im
vendor: cisco model: asr 1000 series
vendor: cisco model: cisco webex meeting manager
vendor: cisco model: webex meetings client
vendor: cisco model: webex meeting center
vendor: cisco model: cisco webex network recording player
vendor: cisco model: cisco quad
vendor: cisco model: cisco webex training center
vendor: cisco model: activetouch general plugin container
vendor: cisco model: meeting server
vendor: cisco model: webex meetings player t29.10
vendor: cisco model: webex support center
vendor: cisco model: cisco webex meetings
vendor: cisco model: webex meetmenow
vendor: cisco model: webex event center
vendor: cisco model: cisco webex
vendor: cisco model: spark
vendor: cisco model: webex network recording player
vendor: cisco model: cisco webex support center
vendor: cisco model: webex arf players
vendor: cisco model: gpccontainer class
vendor: cisco model: webex connect im
vendor: cisco model: webex meetings server 2.6
vendor: cisco model: webex meetings server 2.7
vendor: cisco model: cisco webex event center
vendor: cisco model: rv345p dual wan gigabit vpn routers
vendor: cisco model: webex meetings suite
vendor: cisco model: quad
vendor: cisco model: cisco webex productivity tools
vendor: cisco model: webex meetings server 2.5
vendor: mesh model: mesh
vendor: google model: android
vendor: google model: google chrome
vendor: google model: chrome
db: NVD ids: CVE-2020-3440, CVE-2018-0276, CVE-2022-20763, CVE-2015-0583, CVE-2014-0708, CVE-2013-6960, CVE-2017-12360, CVE-2013-1231, CVE-2013-1232, CVE-2015-0589, CVE-2018-0103, CVE-2020-27126, CVE-2013-5529, CVE-2020-3604, CVE-2021-1310, CVE-2015-4297, CVE-2018-15416, CVE-2016-1464, CVE-2013-1108, CVE-2016-1482, CVE-2013-6687, CVE-2016-1448, CVE-2021-1242, CVE-2020-3573, CVE-2020-3342, CVE-2018-15422, CVE-2012-1337, CVE-2020-3471, CVE-2013-6968, CVE-2014-8032, CVE-2013-1110, CVE-2018-0436, CVE-2020-7796, CVE-2013-3392, CVE-2016-1484, CVE-2010-3041, CVE-2020-3361, CVE-2019-1926, CVE-2019-1868, CVE-2018-15431, CVE-2014-0682, CVE-2014-8033, CVE-2014-8030, CVE-2020-3345, CVE-2020-3155, CVE-2013-6964, CVE-2013-6961, CVE-2013-1109, CVE-2019-1771, CVE-2020-3319, CVE-2018-15421, CVE-2019-1637, CVE-2013-1107, CVE-2019-16001, CVE-2019-16005, CVE-2021-1525, CVE-2018-0287, CVE-2017-3823, CVE-2020-3603, CVE-2013-6969, CVE-2010-3042, CVE-2017-12293, CVE-2023-20180, CVE-2021-1517, CVE-2020-3347, CVE-2018-15436, CVE-2019-15987, CVE-2019-15287, CVE-2021-1221, CVE-2017-12370, CVE-2017-12366, CVE-2018-0110, CVE-2020-3413, CVE-2016-4349, CVE-2023-20104, CVE-2016-1410, CVE-2019-1640, CVE-2020-3194, CVE-2014-2133, CVE-2013-6972, CVE-2015-0634, CVE-2017-12372, CVE-2016-1389, CVE-2019-1939, CVE-2015-0596, CVE-2013-1118, CVE-2009-2875, CVE-2015-4281, CVE-2019-1954, CVE-2021-1500, CVE-2017-3794, CVE-2017-6784, CVE-2015-4209, CVE-2018-0356, CVE-2018-0112, CVE-2012-6399, CVE-2019-1929, CVE-2020-3322, CVE-2019-1689, CVE-2017-6753, CVE-2023-20047, CVE-2013-6971, CVE-2012-3056, CVE-2013-3425, CVE-2013-6973, CVE-2018-15418, CVE-2016-1446, CVE-2006-3424, CVE-2015-4212, CVE-2017-12296, CVE-2019-1773, CVE-2018-0109, CVE-2018-15442, CVE-2014-3340, CVE-2016-1483, CVE-2014-3311, CVE-2021-1372, CVE-2021-40128, CVE-2020-3116, CVE-2019-1638, CVE-2017-3797, CVE-2019-1636, CVE-2017-12294, CVE-2013-6966, CVE-2012-3939, CVE-2018-15410, CVE-2020-3588, CVE-2018-0288, CVE-2021-1467, CVE-2020-3535, CVE-2018-15461, CVE-2017-6651, CVE-2017-12297, CVE-2022-20863, CVE-2019-1927, CVE-2014-3301, CVE-2016-1449, CVE-2009-2879, CVE-2019-1866, CVE-2015-4208, CVE-2013-6970, CVE-2021-1536, CVE-2020-3541, CVE-2020-3127, CVE-2009-2876, CVE-2009-2878, CVE-2018-15419, CVE-2014-3294, CVE-2017-3811, CVE-2019-1680, CVE-2018-0104, CVE-2018-15414, CVE-2019-1639, CVE-2015-4276, CVE-2012-1336, CVE-2017-3880, CVE-2010-3269, CVE-2017-12371, CVE-2014-2135, CVE-2013-6962, CVE-2021-1503, CVE-2020-3131, CVE-2015-4210, CVE-2019-15286, CVE-2013-6710, CVE-2020-3263, CVE-2019-15285, CVE-2017-12363, CVE-2018-0390, CVE-2018-0111, CVE-2021-34743, CVE-2011-4004, CVE-2017-3799, CVE-2014-3400, CVE-2019-1928, CVE-2010-3043, CVE-2012-1335, CVE-2014-0691, CVE-2014-3395, CVE-2014-3303, CVE-2022-20778, CVE-2021-1311, CVE-2023-20132, CVE-2006-3423, CVE-2014-8035, CVE-2010-3044, CVE-2020-3128, CVE-2014-3286, CVE-2020-3182, CVE-2018-0380, CVE-2018-15415, CVE-2013-1116, CVE-2018-0264, CVE-2021-1502, CVE-2014-8031, CVE-2007-6005, CVE-2016-1450, CVE-2013-6709, CVE-2010-3270, CVE-2017-12368, CVE-2013-6963, CVE-2017-12369, CVE-2017-3796, CVE-2015-0595, CVE-2018-15417, CVE-2015-4207, CVE-2012-3054, CVE-2020-3501, CVE-2018-15420, CVE-2015-0597, CVE-2011-3319, CVE-2014-3304, CVE-2012-3055, CVE-2018-0357, CVE-2013-1115, CVE-2014-3296, CVE-2018-15412, CVE-2013-1244, CVE-2013-1205, CVE-2020-3502, CVE-2013-6711, CVE-2019-1924, CVE-2013-6959, CVE-2015-0590, CVE-2020-3463, CVE-2014-2199, CVE-2021-1526, CVE-2019-1772, CVE-2014-8036, CVE-2018-15413, CVE-2014-3310, CVE-2017-3795, CVE-2017-12257, CVE-2021-1527, CVE-2013-6965, CVE-2021-40115, CVE-2020-3419, CVE-2014-3302, CVE-2009-2880, CVE-2017-6669, CVE-2012-3940, CVE-2012-3053, CVE-2018-15409, CVE-2016-1415, CVE-2013-1245, CVE-2012-6397, CVE-2019-1674, CVE-2019-1948, CVE-2019-16307, CVE-2019-15283, CVE-2020-3126, CVE-2020-3472, CVE-2019-1677, CVE-2018-15411, CVE-2014-2136, CVE-2014-2134, CVE-2020-3441, CVE-2022-20820, CVE-2023-20133, CVE-2018-0387, CVE-2021-1351, CVE-2017-12365, CVE-2017-12359, CVE-2014-2186, CVE-2018-0379, CVE-2013-6967, CVE-2012-3941, CVE-2023-20134, CVE-2017-12295, CVE-2013-1119, CVE-2019-1655, CVE-2022-20852, CVE-2016-1447, CVE-2015-0668, CVE-2020-3321, CVE-2012-3936, CVE-2019-1641, CVE-2019-15960, CVE-2017-12298, CVE-2021-1420, CVE-2012-3937, CVE-2008-3558, CVE-2014-8034, CVE-2013-3448, CVE-2019-15284, CVE-2018-0457, CVE-2018-0108, CVE-2015-4194, CVE-2013-1117, CVE-2012-3938, CVE-2016-1309, CVE-2021-1544, CVE-2020-3412, CVE-2020-3542, CVE-2009-2877, CVE-2018-15408, CVE-2014-2132, CVE-2017-12367, CVE-2019-1925, CVE-2015-6384, CVE-2018-0422, CVE-2012-3057, CVE-2014-3305, CVE-2020-3142

Trust: 5.75

Fetched: Jan. 14, 2024, 9:26 a.m., Published: Oct. 17, 2023, midnight
Vulnerabilities: authentication bypass
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: routers
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
db: NVD ids: CVE-2023-20198
Related entries in the VARIoT vulnerabilities database: VAR-200411-0080, VAR-200809-0311, VAR-200803-0060, VAR-200809-0004, VAR-200803-0006, VAR-202012-1099, VAR-202204-1970, VAR-201708-0403, VAR-200605-0265, VAR-200508-0116, VAR-202208-2139, VAR-202002-0522, VAR-200803-0008, VAR-201101-0214, VAR-200801-0206, VAR-200806-0028, VAR-200505-0999, VAR-202002-0525, VAR-200810-0303, VAR-200710-0057, VAR-201810-1148, VAR-200508-0264, VAR-201006-0258, VAR-200905-0190, VAR-202002-0565, VAR-200107-0147, VAR-202301-0975, VAR-202301-0949, VAR-202012-1100, VAR-201006-0273, VAR-202301-0652, VAR-200803-0166, VAR-200408-0079, VAR-200412-0233, VAR-200509-0223, VAR-200509-0096, VAR-200905-0191, VAR-201411-0433, VAR-202305-2432, VAR-200905-0192, VAR-201910-1351, VAR-200212-0695, VAR-202012-1102, VAR-201810-1093, VAR-200610-0506, VAR-200203-0057, VAR-200703-0627, VAR-201409-0056, VAR-201409-0059, VAR-200707-0349, VAR-200211-0010, VAR-202010-0520, VAR-202002-0519, VAR-200312-0446, VAR-201207-0320, VAR-200906-0439, VAR-201111-0178, VAR-201006-0465, VAR-201906-0418, VAR-200905-0189, VAR-200612-0590, VAR-200812-0329, VAR-200803-0061, VAR-200509-0093, VAR-200601-0270, VAR-201409-0057, VAR-201907-1574, VAR-200803-0064, VAR-200212-0296, VAR-201810-1092, VAR-200909-0134, VAR-202208-1701, VAR-200412-0788, VAR-200803-0170, VAR-200505-0609, VAR-200412-0234, VAR-202002-0520, VAR-200812-0330, VAR-201111-0179, VAR-200905-0193, VAR-200208-0019, VAR-202012-1101, VAR-201911-1035, VAR-202002-0524, VAR-200604-0339, VAR-201809-0319, VAR-200603-0054, VAR-200212-0086, VAR-200704-0461, VAR-200809-0436, VAR-200603-0053, VAR-201712-0291, VAR-201409-0058, VAR-200805-0149, VAR-202001-1158, VAR-200803-0059, VAR-200512-0266, VAR-200905-0188, VAR-200810-0116, VAR-200902-0210, VAR-202002-0523, VAR-200211-0060, VAR-201411-0434, VAR-202102-1300, VAR-201906-0002, VAR-200905-0187, VAR-202002-0571, VAR-200108-0036, VAR-202002-0521, VAR-202305-2397, VAR-200703-0205, VAR-200803-0007, VAR-200212-0041, VAR-201906-0212, VAR-200911-0308, VAR-200611-0141, VAR-200809-0452, VAR-200509-0095, VAR-200509-0097

Trust: 6.25

Fetched: Jan. 14, 2024, 9:20 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: denial of service, directory traversal, os command injection...
Affected productsExternal IDs
vendor: broadcom model: adsl
vendor: broadcom model: bcmwl5.sys wireless device driver
vendor: broadcom model: linux
vendor: broadcom model: bcmwl5.sys
vendor: cisco model: wrt54g
vendor: cisco model: linksys e2000
vendor: cisco model: ip phone
vendor: cisco model: wag200g
vendor: cisco model: linksys wrt350n
vendor: cisco model: wrt300n
vendor: cisco model: linksys ea6500
vendor: cisco model: linksys e1200
vendor: cisco model: ea6200
vendor: cisco model: ea6400
vendor: cisco model: linksys
vendor: cisco model: ea4500
vendor: cisco model: spa-2102 phone adapter
vendor: cisco model: wag54gs
vendor: cisco model: cisco linksys playerpt activex control
vendor: cisco model: wrt54gl
vendor: cisco model: wrt54gc
vendor: cisco model: re6300
vendor: cisco model: e2500
vendor: cisco model: wvc54gca
vendor: cisco model: ea6900
vendor: cisco model: wvbr0
vendor: cisco model: wvc54gc
vendor: cisco model: ea6700
vendor: cisco model: router
vendor: cisco model: linksys wrt54g
vendor: cisco model: e4200v2
vendor: cisco model: linksys ea4500
vendor: cisco model: linksys wrt110
vendor: cisco model: routers
vendor: cisco model: ea2700
vendor: cisco model: linksys playerpt activex control
vendor: cisco model: wrt1900acs
vendor: cisco model: linksys wrt54gc
vendor: cisco model: spa941
vendor: cisco model: linksys e4200
vendor: cisco model: linksys routers
vendor: cisco model: e1200 firmware
vendor: cisco model: wag54g2
vendor: cisco model: re6400
vendor: cisco model: e2500 firmware
vendor: cisco model: wrt54gx
vendor: cisco model: wap54gv3
vendor: cisco model: access points
vendor: cisco model: wvc200 wireless-g ptz internet video camera
vendor: cisco model: wap4400n
vendor: cisco model: cisco wvc200 wireless-g ptz internet video camera
vendor: cisco model: wireless access point
vendor: cisco model: wvc200
vendor: cisco model: cisco linksys wrh54g
vendor: cisco model: linksys e2500
vendor: cisco model: linksys wrt54g router
vendor: cisco model: linksys wag200g
vendor: cisco model: ea6300
vendor: cisco model: velop
vendor: cisco model: linksys wrt54gc router
vendor: cisco model: wrt350n
vendor: cisco model: linksys wrt54g router firmware
vendor: cisco model: wip 330 wireless-g ip phone
vendor: cisco model: linksys wrh54g
vendor: cisco model: cisco linksys wrt350n
vendor: cisco model: ea3500
vendor: cisco model: cisco linksys wrt54gc
vendor: cisco model: linksys wrt54gx
vendor: cisco model: e1200
vendor: cisco model: linksys wrt160n
vendor: cisco model: ea6500 firmware
vendor: cisco model: wrt160n
vendor: cisco model: linksys wag54g2
vendor: cisco model: ea6500
vendor: cisco model: linksys wrt54gs
vendor: cisco model: wrt54gs
vendor: linksys model: wrt54g
vendor: linksys model: wag200g
vendor: linksys model: wrt300n
vendor: linksys model: befsru31
vendor: linksys model: ea6200
vendor: linksys model: ea6400
vendor: linksys model: ea4500
vendor: linksys model: spa-2102 phone adapter
vendor: linksys model: wag54gs
vendor: linksys model: wrt54gl
vendor: linksys model: wrt54gc
vendor: linksys model: re6300
vendor: linksys model: e2500
vendor: linksys model: befsr41
vendor: linksys model: wrt110
vendor: linksys model: wet11
vendor: linksys model: befsr11
vendor: linksys model: ea6900
vendor: linksys model: wvbr0
vendor: linksys model: wvc54gc
vendor: linksys model: ea6700
vendor: linksys model: e4200v2
vendor: linksys model: befsx41
vendor: linksys model: ea2700
vendor: linksys model: wrt1900acs
vendor: linksys model: spa941
vendor: linksys model: wag54g2
vendor: linksys model: re6400
vendor: linksys model: wrt54gx
vendor: linksys model: wap54gv3
vendor: linksys model: wap4400n
vendor: linksys model: rt31p2
vendor: linksys model: befw11s4
vendor: linksys model: ea6300
vendor: linksys model: velop
vendor: linksys model: wrt350n
vendor: linksys model: re6500
vendor: linksys model: befn2ps4
vendor: linksys model: wip 330 wireless-g ip phone
vendor: linksys model: befvp41
vendor: linksys model: befsr81
vendor: linksys model: wap55ag
vendor: linksys model: wpc300n wireless-n notebook adapter
vendor: linksys model: ea3500
vendor: linksys model: e1200
vendor: linksys model: wvc11b
vendor: linksys model: wrt160n
vendor: linksys model: rt31p2 voip router
vendor: linksys model: wap11
vendor: linksys model: spa941 voip phone
vendor: linksys model: ea6500
vendor: linksys model: wrt54gs
vendor: marvell model: semiconductor 88w8361p-bem1 chipset
vendor: alloy model: gl-2422ap-s
vendor: netgear model: me102
vendor: netgear model: router
vendor: wrt54g model: linksys
vendor: belkin model: linksys wrt1900acs
vendor: belkin model: linksys ea6500
vendor: belkin model: linksys e1200
vendor: belkin model: ea6400
vendor: belkin model: ea6900
vendor: belkin model: linksys velop
vendor: belkin model: router
vendor: belkin model: ea2700
vendor: belkin model: wrt1900acs
vendor: belkin model: linksys e4200
vendor: belkin model: linksys re6500
vendor: belkin model: linksys e2500
vendor: belkin model: ea6300
vendor: belkin model: linksys wrt160nl
vendor: belkin model: ea6500
vendor: belkin model: belkin linksys wrt160nl 1.0.04.002_us_20130619
vendor: d-link model: router
vendor: d-link model: di-804
vendor: d-link model: dl-704
vendor: marvell semiconductor model: semiconductor 88w8361p-bem1 chipset
vendor: wisecom model: gl2422ap-0t
vendor: apple model: safari
vendor: atmel model: 802.11b vnet-b access point
vendor: globalsuntech model: wisecom gl2422ap-0t
db: NVD ids: CVE-2004-0312, CVE-2008-1144, CVE-2008-1264, CVE-2008-1197, CVE-2007-6707, CVE-2020-35713, CVE-2022-24372, CVE-2017-10677, CVE-2006-2559, CVE-2022-35572, CVE-2005-2589, CVE-2022-38555, CVE-2013-2681, CVE-2007-6709, CVE-2011-0352, CVE-2008-0228, CVE-2008-2636, CVE-2005-1059, CVE-2013-2684, CVE-2008-4441, CVE-2007-5411, CVE-2018-3953, CVE-2005-2434, CVE-2010-2261, CVE-2009-1558, CVE-2013-3067, CVE-2001-0514, CVE-2022-43970, CVE-2022-43973, CVE-2020-35714, CVE-2010-1573, CVE-2022-43972, CVE-2008-1243, CVE-2004-0580, CVE-2004-2507, CVE-2005-2799, CVE-2005-2915, CVE-2009-1559, CVE-2014-8243, CVE-2023-31742, CVE-2009-1560, CVE-2013-4658, CVE-2002-2371, CVE-2020-35716, CVE-2018-3955, CVE-2006-5202, CVE-2002-0109, CVE-2007-1585, CVE-2013-3064, CVE-2013-3068, CVE-2007-3574, CVE-2002-1236, CVE-2023-31740, CVE-2020-26561, CVE-2013-2678, CVE-2003-1497, CVE-2012-0284, CVE-2009-2073, CVE-2011-4499, CVE-2010-2506, CVE-2019-7579, CVE-2009-1557, CVE-2006-6411, CVE-2008-4390, CVE-2008-1265, CVE-2005-2912, CVE-2006-0309, CVE-2013-3065, CVE-2019-11535, CVE-2022-38841, CVE-2008-1268, CVE-2002-1865, CVE-2018-3954, CVE-2009-3341, CVE-2022-38132, CVE-2004-2606, CVE-2009-5140, CVE-2008-1247, CVE-2005-0334, CVE-2004-2508, CVE-2013-2679, CVE-2008-4391, CVE-2011-4500, CVE-2009-1561, CVE-2002-0426, CVE-2020-35715, CVE-2019-16340, CVE-2013-2683, CVE-2006-1973, CVE-2018-17208, CVE-2006-1068, CVE-2002-2137, CVE-2007-2270, CVE-2008-4296, CVE-2006-1067, CVE-2017-17411, CVE-2022-43971, CVE-2013-3066, CVE-2008-2092, CVE-2013-5122, CVE-2008-1263, CVE-2005-4257, CVE-2009-1556, CVE-2008-4594, CVE-2008-6280, CVE-2013-2682, CVE-2002-1312, CVE-2014-8244, CVE-2021-25310, CVE-2009-5157, CVE-2009-1555, CVE-2013-3568, CVE-2001-1117, CVE-2013-2680, CVE-2023-31741, CVE-2006-7121, CVE-2007-6708, CVE-2002-2159, CVE-2019-7311, CVE-2007-5475, CVE-2006-5882, CVE-2007-5474, CVE-2005-2914, CVE-2005-2916

Trust: 3.5

Fetched: Jan. 14, 2024, 9:18 a.m., Published: Jan. 9, 2024, 6:54 p.m.
Vulnerabilities: feature bypass, security feature bypass, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-20700, CVE-2024-20674

Trust: 3.25

Fetched: Jan. 14, 2024, 9:18 a.m., Published: Jan. 11, 2024, midnight
Vulnerabilities: privilege escalation
Affected productsExternal IDs
db: NVD ids: CVE-2023-29357

Trust: 5.0

Fetched: Jan. 12, 2024, 9:54 a.m., Published: Jan. 10, 2024, 4 p.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs
vendor: cisco model: identity services engine
vendor: cisco model: cisco identity services engine

Trust: 3.5

Fetched: Jan. 12, 2024, 9:52 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.5

Fetched: Jan. 12, 2024, 9:52 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.25

Fetched: Jan. 12, 2024, 9:51 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-43115

Trust: 3.25

Fetched: Jan. 12, 2024, 9:51 a.m., Published: Jan. 10, 2024, 5:21 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-20666

Trust: 3.5

Fetched: Jan. 12, 2024, 9:50 a.m., Published: Jan. 12, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: filezilla model: server
db: NVD ids: CVE-2023-36025

Trust: 3.0

Fetched: Jan. 12, 2024, 9:49 a.m., Published: Jan. 10, 2024, 7:36 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916

Trust: 5.0

Fetched: Jan. 12, 2024, 9:38 a.m., Published: Jan. 10, 2024, 10:05 a.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs
vendor: cisco model: identity services engine
vendor: cisco model: cisco identity services engine

Trust: 3.25

Fetched: Jan. 12, 2024, 9:33 a.m., Published: Jan. 11, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916

Trust: 5.75

Fetched: Jan. 12, 2024, 9:32 a.m., Published: Jan. 11, 2024, 4:55 a.m.
Vulnerabilities: command injection, file upload bug, improper validation
Affected productsExternal IDs
vendor: cisco model: wap371
vendor: cisco model: cisco unity
vendor: cisco model: unity
vendor: cisco model: identity services engine
vendor: cisco model: cisco unity connection
vendor: cisco model: wireless access point
vendor: cisco model: telepresence
vendor: cisco model: telepresence management suite
vendor: cisco model: unity connection
db: NVD ids: CVE-2024-20287, CVE-2024-20272

Trust: 3.5

Fetched: Jan. 12, 2024, 9:32 a.m., Published: Jan. 11, 2024, 11:35 a.m.
Vulnerabilities: command injection, command execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-21887, CVE-2023-46805

Trust: 3.25

Fetched: Jan. 12, 2024, 9:27 a.m., Published: Jan. 24, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-50916

Trust: 3.75

Fetched: Jan. 12, 2024, 9:26 a.m., Published: Jan. 24, 2024, midnight
Vulnerabilities: response splitting vulnerability
Affected productsExternal IDs