VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-201906-1018

Trust: 5.75

Fetched: June 1, 2022, 8:16 a.m., Published: March 8, 2022, 1:18 p.m.
Vulnerabilities: code execution, buffer overflow, denial of service...
Affected productsExternal IDs
vendor: broadcom model: broadcom
db: NVD ids: CVE-2022-25252, CVE-2022-25248, CVE-2019-10959, CVE-2022-25250, CVE-2022-25247, CVE-2022-25249, CVE-2022-25251, CVE-2022-25246

Trust: 3.75

Fetched: June 1, 2022, 8:16 a.m., Published: June 5, 2022, midnight
Vulnerabilities: weak password
Affected productsExternal IDs
vendor: raspberry pi model: 3
Related entries in the VARIoT vulnerabilities database: VAR-202205-0394

Trust: 3.0

Fetched: June 1, 2022, 8:16 a.m., Published: May 24, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2022-1388

Trust: 4.25

Fetched: June 1, 2022, 8:16 a.m., Published: June 11, 2022, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2021-3809, CVE-2021-3808
Related entries in the VARIoT vulnerabilities database: VAR-202203-1378, VAR-202203-0823, VAR-202203-0822, VAR-202203-1379, VAR-202203-0927

Trust: 6.0

Fetched: June 1, 2022, 8:16 a.m., Published: March 22, 2022, 4:06 p.m.
Vulnerabilities: code execution, input validation vulnerability
Affected productsExternal IDs
vendor: dell model: bios
db: NVD ids: CVE-2022-24415, CVE-2022-24421, CVE-2022-24416, CVE-2022-24420, CVE-2022-24419

Trust: 5.25

Fetched: June 1, 2022, 8:16 a.m., Published: April 4, 2022, midnight
Vulnerabilities: buffer overflow, password guessing, service disruption...
Affected productsExternal IDs
vendor: xerox model: colorqube 8580
vendor: xerox model: colorqube
vendor: automationdirect model: click
vendor: automationdirect model: click plc
vendor: alt-n model: securitygateway
vendor: foscam model: foscam
vendor: foscam model: fi9805e
vendor: foscam model: system
vendor: google model: chrome
vendor: google model: wifi
vendor: google model: google chrome
vendor: google model: android
vendor: google model: chrome os
vendor: google model: home
vendor: forcepoint model: email security
vendor: dell model: vnx2
vendor: xiongmai model: ahb7008t-mh-v2
vendor: dell emc model: vnx2
vendor: roku model: roku
vendor: roku model: ultra
vendor: caucho model: resin
vendor: opservices model: opmon
vendor: d-link model: router
vendor: d-link model: dir-823g
vendor: d-link model: dir-878
vendor: cisco model: webex
vendor: cisco model: email_security_appliance
vendor: cisco model: expressway series
vendor: cisco model: cisco webex
vendor: cisco model: ip_phone
vendor: cisco model: cisco email security appliance
vendor: cisco model: telepresence
vendor: cisco model: staros
vendor: cisco model: cisco expressway
vendor: cisco model: series
vendor: cisco model: ip phone
vendor: cisco model: asyncos software
vendor: cisco model: identity_services_engine
vendor: cisco model: service management
vendor: cisco model: cisco webex meetings
vendor: cisco model: cisco staros
vendor: cisco model: webex meetings
vendor: cisco model: asyncos
vendor: cisco model: router
vendor: cisco model: email security appliance
vendor: cisco model: unity
vendor: cisco model: cisco web security appliance
vendor: cisco model: identity services engine
vendor: cisco model: cisco asyncos
vendor: cisco model: telepresence video communication server
vendor: cisco model: cisco telepresence
vendor: cisco model: cisco telepresence video communication server
vendor: cisco model: cisco identity services engine
vendor: cisco model: web security appliance
vendor: cisco model: expressway
vendor: cisco model: management appliance
vendor: trend micro model: security
vendor: trend micro model: antivirus
vendor: trend micro model: trend micro antivirus
vendor: codesys model: linux
vendor: codesys model: runtime
vendor: codesys model: codesys
vendor: codesys model: control
vendor: codesys model: web server
vendor: codesys model: gateway
vendor: dlink model: router
vendor: dlink model: dir-823g
vendor: dlink model: dir-878
vendor: zoho model: manageengine_servicedesk_plus
vendor: zoho model: manageengine_supportcenter_plus
vendor: zoho model: manageengine supportcenter plus
vendor: zoho model: manageengine adselfservice plus
vendor: zoho model: manageengine servicedesk plus
vendor: tenda model: router
vendor: tenda model: tenda ac9
vendor: aveva model: edge
vendor: asus model: rt-ac86u
vendor: asus model: rt-ac56u
vendor: asus model: rt-ax56u
vendor: asus model: router
vendor: asus model: asus
vendor: trend_micro model: security
vendor: trend_micro model: antivirus
vendor: trend_micro model: trend micro antivirus
vendor: serve model: serve
vendor: trend model: security
vendor: trend model: antivirus
vendor: trend model: trend micro antivirus
vendor: samsung model: notes
vendor: samsung model: samsung
vendor: samsung model: note
vendor: samsung model: printers
db: NVD ids: CVE-2021-26113, CVE-2022-28062, CVE-2022-28363, CVE-2022-28805, CVE-2022-23972, CVE-2022-26671, CVE-2022-1148, CVE-2022-24793, CVE-2022-28379, CVE-2022-27463, CVE-2022-27064, CVE-2021-41751, CVE-2022-27883, CVE-2022-0990, CVE-2022-1235, CVE-2022-0467, CVE-2022-20762, CVE-2022-26676, CVE-2021-46417, CVE-2022-26909, CVE-2021-44169, CVE-2022-1174, CVE-2022-28352, CVE-2021-32585, CVE-2022-1170, CVE-2022-0809, CVE-2022-20756, CVE-2022-1121, CVE-2021-30080, CVE-2022-20784, CVE-2021-44138, CVE-2021-46436, CVE-2022-28355, CVE-2020-28847, CVE-2022-1165, CVE-2022-26605, CVE-2021-32980, CVE-2022-1234, CVE-2021-36290, CVE-2021-33616, CVE-2020-29013, CVE-2022-27147, CVE-2022-27124, CVE-2022-27352, CVE-2022-23440, CVE-2021-36202, CVE-2021-32981, CVE-2022-20781, CVE-2022-25613, CVE-2022-24978, CVE-2021-36287, CVE-2021-36293, CVE-2022-27441, CVE-2022-24801, CVE-2022-0603, CVE-2021-43421, CVE-2022-28063, CVE-2021-32978, CVE-2021-43009, CVE-2021-25048, CVE-2022-26675, CVE-2020-23349, CVE-2022-0677, CVE-2022-20665, CVE-2022-26619, CVE-2021-46416, CVE-2022-1185, CVE-2022-27349, CVE-2021-41026, CVE-2022-0431, CVE-2022-24786, CVE-2022-27022, CVE-2022-26585, CVE-2022-22515, CVE-2022-26250, CVE-2021-36288, CVE-2022-25595, CVE-2022-28651, CVE-2022-0958, CVE-2020-27387, CVE-2022-22517, CVE-2021-43457, CVE-2020-27376, CVE-2022-22410, CVE-2021-40375, CVE-2022-0602, CVE-2021-32986, CVE-2021-43454, CVE-2022-22339, CVE-2022-23441, CVE-2022-25594, CVE-2022-0837, CVE-2021-32994, CVE-2022-22355, CVE-2022-26588, CVE-2020-27375, CVE-2022-27651, CVE-2022-20774, CVE-2022-26986, CVE-2022-0808, CVE-2021-46419, CVE-2022-1248, CVE-2022-27442, CVE-2022-24813, CVE-2021-43498, CVE-2022-26361, CVE-2021-33207, CVE-2022-26891, CVE-2022-1287, CVE-2020-29657, CVE-2022-1175, CVE-2022-27348, CVE-2022-0461, CVE-2021-40374, CVE-2022-27346, CVE-2022-27047, CVE-2022-1213, CVE-2022-25154, CVE-2022-1099, CVE-2021-43521, CVE-2022-1026, CVE-2022-1223, CVE-2022-26360, CVE-2021-43463, CVE-2022-28649, CVE-2021-45103, CVE-2022-28116, CVE-2022-22513, CVE-2022-1162, CVE-2022-23732, CVE-2022-22519, CVE-2022-1253, CVE-2022-1190, CVE-2022-25339, CVE-2022-26591, CVE-2022-26359, CVE-2022-0537, CVE-2021-27117, CVE-2021-41245, CVE-2021-42324, CVE-2022-25584, CVE-2022-27357, CVE-2022-23973, CVE-2022-0887, CVE-2022-1224, CVE-2021-28428, CVE-2022-27109, CVE-2022-1243, CVE-2022-26627, CVE-2022-20763, CVE-2022-27436, CVE-2021-38834, CVE-2022-25569, CVE-2016-4437, CVE-2022-27123, CVE-2021-43474, CVE-2022-0935, CVE-2022-1105, CVE-2022-23699, CVE-2021-25113, CVE-2022-27462, CVE-2022-27061, CVE-2022-0462, CVE-2022-27152, CVE-2021-43515, CVE-2022-26624, CVE-2022-26912, CVE-2021-46437, CVE-2022-27145, CVE-2021-32984, CVE-2022-26615, CVE-2021-36776, CVE-2022-26233, CVE-2022-27016, CVE-2022-24819, CVE-2022-27304, CVE-2022-1201, CVE-2022-26908, CVE-2022-26612, CVE-2022-28364, CVE-2022-0939, CVE-2022-26357, CVE-2022-26900, CVE-2022-28001, CVE-2022-1210, CVE-2022-27146, CVE-2021-32682, CVE-2021-46367, CVE-2022-0740, CVE-2022-1100, CVE-2022-24814, CVE-2022-26894, CVE-2020-27374, CVE-2022-27046, CVE-2022-1168, CVE-2022-1233, CVE-2022-27063, CVE-2022-23909, CVE-2022-26281, CVE-2021-45894, CVE-2021-43205, CVE-2022-28002, CVE-2022-28378, CVE-2021-26116, CVE-2022-26613, CVE-2022-28468, CVE-2022-27435, CVE-2022-24787, CVE-2021-36851, CVE-2022-0405, CVE-2022-22356, CVE-2022-22563, CVE-2021-45892, CVE-2021-43517, CVE-2022-24822, CVE-2021-27116, CVE-2022-1166, CVE-2022-1169, CVE-2022-27110, CVE-2022-24780, CVE-2022-26356, CVE-2022-28376, CVE-2021-32593, CVE-2021-43430, CVE-2022-28380, CVE-2022-25596, CVE-2022-27148, CVE-2022-20782, CVE-2022-24811, CVE-2022-25373, CVE-2022-0403, CVE-2022-27992, CVE-2022-26110, CVE-2022-24785, CVE-2022-28115, CVE-2022-27108, CVE-2022-25597, CVE-2021-26112, CVE-2022-1284, CVE-2022-20754, CVE-2022-26572, CVE-2022-26630, CVE-2022-27044, CVE-2022-27649, CVE-2022-26895, CVE-2022-26851, CVE-2022-24428, CVE-2021-40656, CVE-2022-1167, CVE-2022-20675, CVE-2022-26982, CVE-2020-4668, CVE-2022-20741, CVE-2022-20755, CVE-2022-26628, CVE-2022-1120, CVE-2022-27650, CVE-2022-26607, CVE-2022-1211, CVE-2022-0709, CVE-2022-26953, CVE-2022-26952, CVE-2021-26114, CVE-2021-22127, CVE-2020-27373, CVE-2022-22518, CVE-2022-1212, CVE-2022-27062, CVE-2022-1222, CVE-2020-22253, CVE-2022-26635, CVE-2022-1188, CVE-2022-0901, CVE-2022-1236, CVE-2022-27609, CVE-2021-43456, CVE-2022-28368, CVE-2021-41715, CVE-2021-43464, CVE-2021-45104, CVE-2021-45891, CVE-2022-0884, CVE-2022-24475, CVE-2022-25618, CVE-2022-26616, CVE-2020-28062, CVE-2021-46418, CVE-2021-33010, CVE-2022-23698, CVE-2022-26852, CVE-2022-24231, CVE-2022-26358, CVE-2022-25338, CVE-2021-41752, CVE-2022-25356, CVE-2022-26530, CVE-2021-43138, CVE-2022-28365, CVE-2021-43429, CVE-2021-39114, CVE-2022-1288, CVE-2022-1225, CVE-2022-28467, CVE-2021-33008, CVE-2022-0825, CVE-2022-24229, CVE-2022-24191, CVE-2021-32977, CVE-2022-27608, CVE-2021-32982, CVE-2022-0793, CVE-2021-43460, CVE-2021-43008, CVE-2022-26251, CVE-2022-23970, CVE-2021-43453, CVE-2022-23900, CVE-2021-43483, CVE-2022-1237, CVE-2022-0466, CVE-2021-43455, CVE-2022-22516, CVE-2021-45893, CVE-2022-1238, CVE-2022-28219, CVE-2022-27818, CVE-2022-24681, CVE-2022-25245, CVE-2022-26855, CVE-2022-26670, CVE-2022-27351, CVE-2022-1244, CVE-2021-36775, CVE-2022-1189, CVE-2022-1111, CVE-2022-27107, CVE-2022-23974, CVE-2020-19229, CVE-2022-26877, CVE-2022-28648, CVE-2022-26854, CVE-2021-24009, CVE-2022-0830, CVE-2022-26180, CVE-2022-24821, CVE-2021-44109, CVE-2022-23446, CVE-2022-1164, CVE-2021-43458, CVE-2021-43503, CVE-2022-28650, CVE-2021-43432, CVE-2022-1219, CVE-2022-28000, CVE-2021-26104, CVE-2022-26850, CVE-2022-27991, CVE-2022-1191, CVE-2022-23697, CVE-2022-0864, CVE-2022-24795, CVE-2022-0404, CVE-2022-1283, CVE-2022-1240, CVE-2022-24523, CVE-2022-23700, CVE-2021-32985, CVE-2022-27819, CVE-2022-28391, CVE-2021-44108, CVE-2022-22514, CVE-2022-28796, CVE-2022-23971, CVE-2022-24820, CVE-2021-30497

Trust: 5.25

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2050, midnight
Vulnerabilities: code execution, privilege escalation, session fixation...
Affected productsExternal IDs
vendor: dell model: invincea-x
vendor: dell model: invincea dell protected workspace
vendor: sophos model: invincea-x
vendor: sophos model: xg firewall
vendor: sophos model: anti-virus
vendor: sophos model: sophos utm
vendor: sophos model: sophos web appliance
vendor: sophos model: mobile
vendor: sophos model: cyberoam
vendor: sophos model: endpoint protection
vendor: sophos model: web appliance
vendor: sophos model: secure web gateway
vendor: sophos model: cloud optix
vendor: sophos model: invincea dell protected workspace
vendor: sophos model: sophos anti-virus
vendor: sophos model: intercept x endpoint
vendor: sophos model: dell protected workspace
db: NVD ids: CVE-2022-0331, CVE-2018-6851, CVE-2018-6856, CVE-2016-9038, CVE-2017-6412, CVE-2021-25270, CVE-2021-25271, CVE-2020-15504, CVE-2020-10947, CVE-2016-9553, CVE-2021-25264, CVE-2022-0652, CVE-2021-36809, CVE-2017-9523, CVE-2018-6857, CVE-2021-36808, CVE-2020-17352, CVE-2018-6855, CVE-2022-0386, CVE-2016-7442, CVE-2017-7441, CVE-2017-6184, CVE-2016-8732, CVE-2021-25273, CVE-2021-36807, CVE-2020-9540, CVE-2018-6319, CVE-2017-6182, CVE-2018-6852, CVE-2018-3970, CVE-2022-1040, CVE-2018-3971, CVE-2018-6854, CVE-2017-6007, CVE-2018-4863, CVE-2021-25269, CVE-2020-25223, CVE-2018-9233, CVE-2016-7397, CVE-2020-29574, CVE-2021-25266, CVE-2017-6008, CVE-2016-9554, CVE-2018-6853, CVE-2018-6318, CVE-2017-6183, CVE-2016-6597, CVE-2020-14980, CVE-2017-17023, CVE-2020-9363
Related entries in the VARIoT vulnerabilities database: VAR-202202-1707, VAR-202203-0043

Trust: 5.5

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2050, midnight
Vulnerabilities: buffer overflow, privilege escalation, memory corruption...
Affected productsExternal IDs
vendor: alsa model: alsa
db: NVD ids: CVE-2022-0617, CVE-2022-0998, CVE-2022-0646, CVE-2022-26966, CVE-2022-1280, CVE-2022-26490, CVE-2022-1516, CVE-2022-0435, CVE-2022-27223, CVE-2022-28893, CVE-2022-25375, CVE-2022-0494, CVE-2022-0516, CVE-2022-29968, CVE-2022-1015, CVE-2022-0487, CVE-2022-1116, CVE-2022-24448, CVE-2022-24122, CVE-2022-23222, CVE-2022-1353, CVE-2022-0433, CVE-2022-27950, CVE-2022-25265, CVE-2022-0500, CVE-2022-27666, CVE-2022-26878, CVE-2022-25258, CVE-2022-1195, CVE-2022-29582, CVE-2022-0995, CVE-2022-24958, CVE-2022-30594, CVE-2022-0854, CVE-2022-25636, CVE-2022-28388, CVE-2022-0492, CVE-2022-28356, CVE-2022-1679, CVE-2022-1048, CVE-2022-29581, CVE-2022-1055, CVE-2022-0847, CVE-2022-1011, CVE-2022-29156, CVE-2022-28390, CVE-2022-24959, CVE-2022-28796, CVE-2022-0742, CVE-2022-28389

Trust: 6.25

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2050, midnight
Vulnerabilities: cross-site scripting, code execution, denial of service...
Affected productsExternal IDs
vendor: clam model: clamav
vendor: cisco model: cisco ios
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco sd-wan
vendor: cisco model: webex
vendor: cisco model: unity connection
vendor: cisco model: cisco firepower management center
vendor: cisco model: ios xr
vendor: cisco model: cisco unity
vendor: cisco model: expressway series
vendor: cisco model: ios xr software
vendor: cisco model: cisco webex
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco ios xr
vendor: cisco model: security manager
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: wireless access point
vendor: cisco model: sd-wan vmanage software
vendor: cisco model: sd-wan
vendor: cisco model: telepresence
vendor: cisco model: staros
vendor: cisco model: asdm
vendor: cisco model: cisco security manager
vendor: cisco model: clientless ssl vpn
vendor: cisco model: device manager
vendor: cisco model: cisco expressway
vendor: cisco model: series
vendor: cisco model: firepower management center
vendor: cisco model: umbrella virtual appliance
vendor: cisco model: umbrella
vendor: cisco model: cisco webex meetings
vendor: cisco model: security device manager
vendor: cisco model: cisco staros
vendor: cisco model: unified communications manager session management edition
vendor: cisco model: webex meetings
vendor: cisco model: sd-wan vmanage
vendor: cisco model: cisco roomos
vendor: cisco model: router
vendor: cisco model: firepower
vendor: cisco model: roomos
vendor: cisco model: unity
vendor: cisco model: cisco unified communications manager
vendor: cisco model: telepresence collaboration endpoint
vendor: cisco model: identity services engine
vendor: cisco model: adaptive security device manager
vendor: cisco model: telepresence video communication server
vendor: cisco model: clamav
vendor: cisco model: cisco telepresence
vendor: cisco model: cisco unity connection
vendor: cisco model: unified communications manager
vendor: cisco model: cisco telepresence video communication server
vendor: cisco model: 1000 series connected grid router
vendor: cisco model: cisco umbrella virtual appliance
vendor: cisco model: cgr1k
vendor: cisco model: cisco identity services engine
vendor: cisco model: expressway
vendor: cisco model: unified communications
vendor: clamav model: clamav
vendor: snort model: snort
db: NVD ids: CVE-2022-20737, CVE-2022-20770, CVE-2022-20787, CVE-2022-20804, CVE-2022-20745, CVE-2022-20738, CVE-2022-20750, CVE-2022-20756, CVE-2022-22965, CVE-2022-20796, CVE-2022-20788, CVE-2022-20779, CVE-2022-20743, CVE-2022-20746, CVE-2022-20742, CVE-2022-20730, CVE-2022-20729, CVE-2022-20794, CVE-2022-20767, CVE-2022-20741, CVE-2022-20786, CVE-2022-20789, CVE-2022-20755, CVE-2022-20782, CVE-2022-20740, CVE-2022-20739, CVE-2022-20760, CVE-2022-20763, CVE-2022-20780, CVE-2022-20732, CVE-2022-20777, CVE-2022-20764, CVE-2022-20758, CVE-2022-20790, CVE-2022-20735, CVE-2022-20773, CVE-2022-20748, CVE-2022-20783, CVE-2022-20771, CVE-2022-20759, CVE-2022-20747, CVE-2022-20734, CVE-2022-20762, CVE-2022-20761, CVE-2022-20778, CVE-2022-20757, CVE-2022-20785, CVE-2022-20744, CVE-2022-20754, CVE-2022-20805

Trust: 6.25

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2050, midnight
Vulnerabilities: cross-site scripting, code execution, denial of service...
Affected productsExternal IDs
vendor: clam model: clamav
vendor: cisco model: cisco ios
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco sd-wan
vendor: cisco model: webex
vendor: cisco model: unity connection
vendor: cisco model: cisco firepower management center
vendor: cisco model: ios xr
vendor: cisco model: cisco unity
vendor: cisco model: expressway series
vendor: cisco model: ios xr software
vendor: cisco model: cisco webex
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco ios xr
vendor: cisco model: security manager
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: wireless access point
vendor: cisco model: sd-wan vmanage software
vendor: cisco model: sd-wan
vendor: cisco model: telepresence
vendor: cisco model: staros
vendor: cisco model: asdm
vendor: cisco model: cisco security manager
vendor: cisco model: clientless ssl vpn
vendor: cisco model: device manager
vendor: cisco model: cisco expressway
vendor: cisco model: series
vendor: cisco model: firepower management center
vendor: cisco model: umbrella virtual appliance
vendor: cisco model: umbrella
vendor: cisco model: cisco webex meetings
vendor: cisco model: security device manager
vendor: cisco model: cisco staros
vendor: cisco model: unified communications manager session management edition
vendor: cisco model: webex meetings
vendor: cisco model: sd-wan vmanage
vendor: cisco model: cisco roomos
vendor: cisco model: router
vendor: cisco model: firepower
vendor: cisco model: roomos
vendor: cisco model: unity
vendor: cisco model: cisco unified communications manager
vendor: cisco model: telepresence collaboration endpoint
vendor: cisco model: identity services engine
vendor: cisco model: adaptive security device manager
vendor: cisco model: telepresence video communication server
vendor: cisco model: clamav
vendor: cisco model: cisco telepresence
vendor: cisco model: cisco unity connection
vendor: cisco model: unified communications manager
vendor: cisco model: cisco telepresence video communication server
vendor: cisco model: 1000 series connected grid router
vendor: cisco model: cisco umbrella virtual appliance
vendor: cisco model: cgr1k
vendor: cisco model: cisco identity services engine
vendor: cisco model: expressway
vendor: cisco model: unified communications
vendor: clamav model: clamav
vendor: snort model: snort
db: NVD ids: CVE-2022-20737, CVE-2022-20770, CVE-2022-20787, CVE-2022-20804, CVE-2022-20745, CVE-2022-20738, CVE-2022-20750, CVE-2022-20756, CVE-2022-22965, CVE-2022-20796, CVE-2022-20788, CVE-2022-20779, CVE-2022-20743, CVE-2022-20746, CVE-2022-20742, CVE-2022-20730, CVE-2022-20729, CVE-2022-20794, CVE-2022-20767, CVE-2022-20741, CVE-2022-20786, CVE-2022-20789, CVE-2022-20755, CVE-2022-20782, CVE-2022-20740, CVE-2022-20739, CVE-2022-20760, CVE-2022-20763, CVE-2022-20780, CVE-2022-20732, CVE-2022-20777, CVE-2022-20764, CVE-2022-20758, CVE-2022-20790, CVE-2022-20735, CVE-2022-20773, CVE-2022-20748, CVE-2022-20783, CVE-2022-20771, CVE-2022-20759, CVE-2022-20747, CVE-2022-20734, CVE-2022-20762, CVE-2022-20761, CVE-2022-20778, CVE-2022-20757, CVE-2022-20785, CVE-2022-20744, CVE-2022-20754, CVE-2022-20805

Trust: 3.5

Fetched: June 1, 2022, 8:16 a.m., Published: April 20, 2022, 3:10 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: lenovo model: updates
vendor: lenovo model: notebook
vendor: lenovo model: bios
vendor: lenovo model: system
vendor: lenovo model: flex
vendor: lenovo model: yoga
db: NVD ids: CVE-2021-3972, CVE-2021-3971, CVE-2021-3970

Trust: 6.25

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2050, midnight
Vulnerabilities: improper validation, kernel panic, denial of service...
Affected productsExternal IDs
vendor: clam model: clamav
vendor: cisco model: cisco ios
vendor: cisco model: adaptive security appliance
vendor: cisco model: ios xr
vendor: cisco model: ios xr software
vendor: cisco model: cisco ios xe
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco ios xr
vendor: cisco model: cisco email security appliance
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: wireless access point
vendor: cisco model: ios xe software
vendor: cisco model: telepresence
vendor: cisco model: staros
vendor: cisco model: clientless ssl vpn
vendor: cisco model: series
vendor: cisco model: catalyst 9800
vendor: cisco model: ios software
vendor: cisco model: ios xe
vendor: cisco model: catalyst
vendor: cisco model: asyncos software
vendor: cisco model: series wireless controllers
vendor: cisco model: wireless controller
vendor: cisco model: cisco staros
vendor: cisco model: unified communications manager session management edition
vendor: cisco model: cisco roomos
vendor: cisco model: asyncos
vendor: cisco model: router
vendor: cisco model: firepower
vendor: cisco model: email security appliance
vendor: cisco model: roomos
vendor: cisco model: cisco unified communications manager
vendor: cisco model: telepresence collaboration endpoint
vendor: cisco model: access points
vendor: cisco model: cisco asyncos
vendor: cisco model: clamav
vendor: cisco model: cisco telepresence
vendor: cisco model: unified communications manager
vendor: cisco model: 1000 series connected grid router
vendor: cisco model: cgr1k
vendor: cisco model: unified communications
vendor: clamav model: clamav
vendor: snort model: snort
db: NVD ids: CVE-2022-20737, CVE-2022-20694, CVE-2022-20770, CVE-2022-20653, CVE-2022-20804, CVE-2022-20745, CVE-2022-20715, CVE-2022-20692, CVE-2022-20750, CVE-2022-20697, CVE-2022-20796, CVE-2022-20683, CVE-2022-20746, CVE-2022-20682, CVE-2022-20794, CVE-2022-20767, CVE-2021-34704, CVE-2022-20760, CVE-2022-20764, CVE-2022-20758, CVE-2022-20679, CVE-2022-20622, CVE-2022-20748, CVE-2022-20783, CVE-2022-20771, CVE-2022-20684, CVE-2022-20761, CVE-2022-20757, CVE-2022-20785, CVE-2021-1573

Trust: 4.5

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 6002, midnight
Vulnerabilities: command execution, command injection
Affected productsExternal IDs
db: NVD ids: CVE-2022-27224
Related entries in the VARIoT vulnerabilities database: VAR-202203-1409, VAR-202203-0870, VAR-202203-0835, VAR-202203-0836

Trust: 4.0

Fetched: June 1, 2022, 8:16 a.m., Published: March 4, 2022, 6:10 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco expressway
vendor: cisco model: series
vendor: cisco model: cisco telepresence video communication server
vendor: cisco model: small business
vendor: cisco model: catalyst 4500
vendor: cisco model: rv260
vendor: cisco model: rv340
vendor: cisco model: rv325 dual gigabit wan vpn
vendor: cisco model: ios xe
vendor: cisco model: series switches
vendor: cisco model: catalyst
vendor: cisco model: expressway series
vendor: cisco model: rv345
vendor: cisco model: expressway
vendor: cisco model: cisco staros
vendor: cisco model: rv320
vendor: cisco model: identity services engine
vendor: cisco model: telepresence video communication server
vendor: cisco model: rv160
vendor: cisco model: telepresence
vendor: cisco model: staros
vendor: cisco model: cisco telepresence
vendor: cisco model: rv325
db: NVD ids: CVE-2022-20762, CVE-2022-20665, CVE-2022-20756, CVE-2022-20754, CVE-2022-20755

Trust: 3.0

Fetched: June 1, 2022, 8:16 a.m., Published: May 19, 2022, 9:42 a.m.
Vulnerabilities: -
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202107-1010

Trust: 3.75

Fetched: June 1, 2022, 8:16 a.m., Published: March 17, 2022, 2:41 a.m.
Vulnerabilities: password guessing
Affected productsExternal IDs
db: NVD ids: CVE-2021-34527

Trust: 4.5

Fetched: June 1, 2022, 8:16 a.m., Published: -
Vulnerabilities: code execution, format string vulnerability
Affected productsExternal IDs
db: NVD ids: CVE-2022-1215
Related entries in the VARIoT vulnerabilities database: VAR-202205-0957

Trust: 3.75

Fetched: June 1, 2022, 8:16 a.m., Published: June 1, 2022, midnight
Vulnerabilities: code execution, command injection
Affected productsExternal IDs
db: NVD ids: CVE-2022-30525
Related entries in the VARIoT vulnerabilities database: VAR-202203-0043

Trust: 4.75

Fetched: June 1, 2022, 8:16 a.m., Published: March 16, 2022, midnight
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: google model: android
vendor: google model: pixel
vendor: samsung model: samsung
db: NVD ids: CVE-2022-0847
Related entries in the VARIoT vulnerabilities database: VAR-202105-1166

Trust: 5.75

Fetched: June 1, 2022, 8:16 a.m., Published: April 29, 2022, 9:48 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: synology model: diskstation
vendor: synology model: diskstation manager
vendor: synology model: synology router manager
vendor: synology model: router manager
vendor: trend micro model: security
vendor: netbsd model: netbsd
vendor: trend model: security
vendor: netatalk model: netatalk
db: NVD ids: CVE-2022-23125, CVE-2022-23123, CVE-2021-31439, CVE-2022-23121, CVE-2022-23124, CVE-2022-23122, CVE-2022-0194