VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-202111-0664

Trust: 4.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Nov. 5, 2021, 2:37 p.m.
Vulnerabilities: improper validation, command injection
Affected productsExternal IDs
vendor: cisco model: cisco technical support
vendor: cisco model: policy suite
vendor: cisco model: policy suite software
vendor: cisco model: catalyst
vendor: cisco model: cisco policy suite
vendor: cisco model: technical support
db: NVD ids: CVE-2021-40112, CVE-2021-40119, CVE-2021-40113, CVE-2021-34795

Trust: 4.0

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 27, 2021, 8:46 p.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: cisco model: firepower
vendor: cisco model: firepower threat defense software
vendor: cisco model: asa software
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: cisco firepower management center
vendor: cisco model: cisco adaptive security appliance software
vendor: cisco model: adaptive security appliance software
vendor: cisco model: adaptive security appliance
vendor: cisco model: firepower management center

Trust: 3.0

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 22, 2021, 1:43 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs

Trust: 3.0

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 26, 2021, 10:01 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: zoom model: zoom

Trust: 3.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 4, 2021, 4:47 p.m.
Vulnerabilities: command injection, cross-site scripting, sql injection...
Affected productsExternal IDs
vendor: openscap model: openscap

Trust: 6.25

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 18, 2021, midnight
Vulnerabilities: authentication bypass, request forgery, code execution...
Affected productsExternal IDs
vendor: trend_micro model: security
vendor: trend_micro model: worry-free business security
vendor: trend_micro model: worry-free business security services
vendor: cisco model: download manager
vendor: cisco model: cisco identity services engine
vendor: cisco model: telepresence management suite
vendor: cisco model: ios xe
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco meeting server
vendor: cisco model: router
vendor: cisco model: series
vendor: cisco model: session border controller
vendor: cisco model: cisco telepresence
vendor: cisco model: identity services engine
vendor: cisco model: catalyst
vendor: cisco model: telepresence
vendor: cisco model: cisco telepresence management suite
vendor: cisco model: sd-wan
vendor: cisco model: ios xe sd-wan software
vendor: cisco model: integrated_management_controller
vendor: cisco model: cisco meeting
vendor: cisco model: cisco integrated management controller
vendor: cisco model: integrated management controller
vendor: cisco model: identity_services_engine
vendor: cisco model: meeting_server
vendor: cisco model: telepresence_management_suite
vendor: cisco model: cisco ios
vendor: cisco model: webex
vendor: cisco model: meeting server
vendor: cisco model: cisco webex
vendor: cisco model: meeting
vendor: apple model: safari
vendor: apple model: macos
vendor: apple model: itunes
vendor: apple model: webkit
vendor: apple model: tvos
vendor: apple model: watchos
vendor: civetweb model: civetweb
vendor: node.js model: node.js
vendor: draytek model: vigorap 1000c
vendor: draytek model: vigorap
vendor: zoho model: manageengine applications manager
vendor: google model: wifi
vendor: google model: android
vendor: trend model: security
vendor: trend model: worry-free business security
vendor: trend model: worry-free business security services
vendor: trend micro model: security
vendor: trend micro model: worry-free business security
vendor: trend micro model: worry-free business security services
db: NVD ids: CVE-2021-31377, CVE-2021-31381, CVE-2021-35594, CVE-2021-31363, CVE-2021-42102, CVE-2021-42012, CVE-2021-35655, CVE-2021-1967, CVE-2021-35577, CVE-2021-35591, CVE-2021-30292, CVE-2021-41159, CVE-2021-1917, CVE-2021-41791, CVE-2021-41127, CVE-2021-0706, CVE-2021-35543, CVE-2021-35617, CVE-2021-42536, CVE-2021-38477, CVE-2021-1984, CVE-2020-23038, CVE-2021-35636, CVE-2021-42538, CVE-2021-42539, CVE-2021-38479, CVE-2021-35635, CVE-2021-31378, CVE-2021-35562, CVE-2021-39127, CVE-2021-30256, CVE-2021-35567, CVE-2021-38461, CVE-2021-35647, CVE-2021-35622, CVE-2021-35661, CVE-2021-35556, CVE-2021-35554, CVE-2021-35536, CVE-2020-36499, CVE-2021-2137, CVE-2021-35616, CVE-2021-31350, CVE-2021-1959, CVE-2021-35627, CVE-2021-31349, CVE-2021-35542, CVE-2021-1949, CVE-2021-39356, CVE-2021-35624, CVE-2021-39354, CVE-2020-23041, CVE-2020-27304, CVE-2021-35638, CVE-2021-35662, CVE-2021-31374, CVE-2020-23052, CVE-2020-28960, CVE-2021-31359, CVE-2021-21746, CVE-2020-36497, CVE-2021-42765, CVE-2021-0703, CVE-2021-38467, CVE-2020-36489, CVE-2021-35574, CVE-2021-34362, CVE-2021-1969, CVE-2020-28967, CVE-2021-42715, CVE-2021-25972, CVE-2021-35572, CVE-2021-2416, CVE-2021-35539, CVE-2020-23045, CVE-2021-31355, CVE-2020-23042, CVE-2021-27746, CVE-2021-21748, CVE-2021-35634, CVE-2021-35568, CVE-2020-23060, CVE-2021-42169, CVE-2020-36485, CVE-2021-42542, CVE-2021-31369, CVE-2021-35626, CVE-2021-31380, CVE-2021-42771, CVE-2021-35545, CVE-2021-41167, CVE-2021-25969, CVE-2021-31371, CVE-2020-23036, CVE-2021-35650, CVE-2021-2477, CVE-2021-42556, CVE-2021-41160, CVE-2021-2332, CVE-2021-42011, CVE-2021-1932, CVE-2021-35589, CVE-2021-35631, CVE-2021-36357, CVE-2021-35630, CVE-2021-31372, CVE-2021-0299, CVE-2021-42766, CVE-2021-42258, CVE-2021-31373, CVE-2021-38475, CVE-2021-35632, CVE-2021-41747, CVE-2021-35598, CVE-2021-35608, CVE-2021-42103, CVE-2020-23044, CVE-2021-21745, CVE-2020-36490, CVE-2021-30315, CVE-2021-1968, CVE-2021-35593, CVE-2021-30312, CVE-2021-38473, CVE-2021-2482, CVE-2021-2483, CVE-2020-36495, CVE-2021-38451, CVE-2020-23050, CVE-2021-35546, CVE-2020-36488, CVE-2021-39348, CVE-2021-35610, CVE-2020-28957, CVE-2021-29873, CVE-2021-2461, CVE-2021-34743, CVE-2021-2479, CVE-2021-2471, CVE-2021-35537, CVE-2020-23039, CVE-2021-31356, CVE-2020-36496, CVE-2021-42762, CVE-2021-35582, CVE-2021-31358, CVE-2021-21744, CVE-2020-28955, CVE-2021-38449, CVE-2021-30258, CVE-2021-25970, CVE-2021-35637, CVE-2021-42327, CVE-2021-42104, CVE-2021-38463, CVE-2021-35639, CVE-2021-41745, CVE-2021-1980, CVE-2021-1985, CVE-2021-34736, CVE-2021-35660, CVE-2020-23049, CVE-2021-35641, CVE-2021-35566, CVE-2021-2485, CVE-2021-2478, CVE-2021-42836, CVE-2021-29883, CVE-2021-1983, CVE-2021-35561, CVE-2021-35559, CVE-2021-34789, CVE-2021-30302, CVE-2021-35560, CVE-2021-41135, CVE-2021-0651, CVE-2021-41133, CVE-2020-36501, CVE-2021-31834, CVE-2021-38453, CVE-2021-35612, CVE-2021-35657, CVE-2021-31353, CVE-2021-35576, CVE-2021-35633, CVE-2021-42261, CVE-2021-20120, CVE-2021-38485, CVE-2021-35570, CVE-2021-35654, CVE-2020-36493, CVE-2021-30849, CVE-2021-35227, CVE-2021-35596, CVE-2021-30306, CVE-2021-39126, CVE-2021-1977, CVE-2021-21747, CVE-2021-41168, CVE-2021-42716, CVE-2021-0483, CVE-2021-2484, CVE-2021-35643, CVE-2021-0870, CVE-2021-30847, CVE-2021-42764, CVE-2021-31360, CVE-2021-35225, CVE-2021-31362, CVE-2021-31382, CVE-2021-42105, CVE-2021-31352, CVE-2020-28961, CVE-2021-35606, CVE-2021-38459, CVE-2021-35656, CVE-2021-41171, CVE-2021-35588, CVE-2020-23058, CVE-2020-14263, CVE-2021-35228, CVE-2020-23046, CVE-2021-35601, CVE-2021-0296, CVE-2021-35597, CVE-2021-35550, CVE-2021-25971, CVE-2021-30316, CVE-2021-35583, CVE-2021-31383, CVE-2021-35602, CVE-2021-35553, CVE-2021-28496, CVE-2020-23061, CVE-2021-38457, CVE-2021-35658, CVE-2021-40123, CVE-2021-35573, CVE-2021-30850, CVE-2021-29835, CVE-2021-41163, CVE-2021-0298, CVE-2020-23051, CVE-2020-28328, CVE-2021-41790, CVE-2020-28969, CVE-2021-34738, CVE-2021-0643, CVE-2021-42534, CVE-2021-35565, CVE-2021-41169, CVE-2021-42107, CVE-2021-35665, CVE-2021-38478, CVE-2020-36494, CVE-2021-30843, CVE-2021-31366, CVE-2021-41149, CVE-2021-3889, CVE-2020-28964, CVE-2021-31354, CVE-2021-0705, CVE-2021-35613, CVE-2021-21743, CVE-2021-35619, CVE-2021-35604, CVE-2020-28956, CVE-2021-35645, CVE-2021-30305, CVE-2021-0708, CVE-2021-0652, CVE-2020-23037, CVE-2021-24702, CVE-2021-35595, CVE-2020-23054, CVE-2021-35541, CVE-2021-35666, CVE-2020-23055, CVE-2021-35659, CVE-2021-41150, CVE-2020-36498, CVE-2021-35644, CVE-2020-23048, CVE-2021-35642, CVE-2021-31351, CVE-2021-41146, CVE-2021-2414, CVE-2021-35603, CVE-2021-36512, CVE-2021-39352, CVE-2021-34760, CVE-2021-30310, CVE-2021-35563, CVE-2021-2476, CVE-2021-30304, CVE-2021-35590, CVE-2021-35540, CVE-2021-35640, CVE-2021-35575, CVE-2021-35646, CVE-2021-38469, CVE-2021-42299, CVE-2021-35549, CVE-2021-30848, CVE-2021-42108, CVE-2011-1075, CVE-2021-35580, CVE-2021-35653, CVE-2021-35230, CVE-2021-2481, CVE-2021-35618, CVE-2021-31682, CVE-2021-35649, CVE-2021-40122, CVE-2021-35592, CVE-2021-35578, CVE-2021-1529, CVE-2021-38471, CVE-2021-30835, CVE-2021-42540, CVE-2021-30257, CVE-2021-23452, CVE-2021-41792, CVE-2020-11303, CVE-2021-42740, CVE-2021-36869, CVE-2021-30842, CVE-2021-35625, CVE-2021-35652, CVE-2021-3455, CVE-2021-35629, CVE-2021-35569, CVE-2021-35586, CVE-2021-35512, CVE-2021-31384, CVE-2021-42096, CVE-2021-31376, CVE-2021-1936, CVE-2021-41744, CVE-2021-30297, CVE-2021-31375, CVE-2021-35551, CVE-2021-31367, CVE-2021-3454, CVE-2021-39321, CVE-2021-1966, CVE-2021-31365, CVE-2021-35623, CVE-2021-2474, CVE-2020-28963, CVE-2021-42101, CVE-2020-36502, CVE-2021-31361, CVE-2020-23040, CVE-2021-30841, CVE-2021-35538, CVE-2021-35564, CVE-2021-23139, CVE-2021-39328, CVE-2021-35611, CVE-2021-40121, CVE-2020-23047, CVE-2021-30288, CVE-2021-31386, CVE-2021-2480, CVE-2021-35557, CVE-2021-35581, CVE-2021-0297, CVE-2021-35621, CVE-2021-21749, CVE-2021-42106, CVE-2021-38465, CVE-2021-35648, CVE-2020-36486, CVE-2021-30291, CVE-2021-35585, CVE-2021-31370, CVE-2021-38481, CVE-2021-35609, CVE-2021-35651, CVE-2020-28968, CVE-2021-28975, CVE-2021-40719, CVE-2021-2475, CVE-2021-0702, CVE-2021-1913, CVE-2020-36492, CVE-2021-35552, CVE-2021-31385, CVE-2021-3888, CVE-2021-31364, CVE-2021-38896, CVE-2021-31357, CVE-2020-23043, CVE-2020-36491, CVE-2021-35584, CVE-2021-42097, CVE-2021-22034, CVE-2021-35620, CVE-2021-38455, CVE-2021-35558, CVE-2021-30359, CVE-2021-35571, CVE-2021-31379, CVE-2021-31368, CVE-2021-39357, CVE-2021-31835, CVE-2021-35628, CVE-2021-35599, CVE-2021-42739, CVE-2021-42840, CVE-2021-35607

Trust: 5.25

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 25, 2021, midnight
Vulnerabilities: access control vulnerability, directory traversal, uncontrolled search path...
Affected productsExternal IDs
vendor: parallels model: parallels desktop
vendor: parallels model: desktop
vendor: parallels model: parallels_desktop
vendor: huawei model: ngfw module
vendor: huawei model: huawei
vendor: huawei model: ngfw
vendor: huawei model: emui
vendor: huawei model: ips_module_firmware
vendor: huawei model: s12700
vendor: huawei model: s5700
vendor: huawei model: s2700
vendor: huawei model: s6700 v200r010c00spc600
vendor: huawei model: nip6600 v500r005c00
vendor: huawei model: s7700
vendor: huawei model: ngfw module v500r005c00
vendor: huawei model: usg9500
vendor: huawei model: s1700
vendor: huawei model: ips module
vendor: huawei model: nip6600
vendor: huawei model: s6700
vendor: huawei model: s9700
vendor: google model: android
vendor: google model: wifi
vendor: automatedlogic model: webctrl
vendor: advantech model: webaccess
vendor: advantech model: webaccess/nms
vendor: freeswitch model: freeswitch
vendor: jquery model: jquery
vendor: d-link model: dap-2020
vendor: d-link model: dap-2020_firmware
vendor: codesys model: control
vendor: codesys model: gateway
vendor: codesys model: runtime
vendor: codesys model: codesys
vendor: codesys model: web server
vendor: skyworth model: penguin aurora box
vendor: cisco model: firepower
vendor: cisco model: firepower_management_center
vendor: cisco model: adaptive_security_appliance
vendor: cisco model: firepower_management_center_virtual_appliance
vendor: cisco model: firepower management center
vendor: cisco model: cisco firepower management center
vendor: cisco model: adaptive security appliance
vendor: cisco model: download manager
vendor: cisco model: routers
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco adaptive security appliance
db: NVD ids: CVE-2020-23041, CVE-2021-38453, CVE-2021-24662, CVE-2021-24884, CVE-2021-22402, CVE-2021-42343, CVE-2021-34793, CVE-2021-38461, CVE-2021-38465, CVE-2021-35231, CVE-2021-24779, CVE-2020-23040, CVE-2021-41179, CVE-2019-3556, CVE-2021-38258, CVE-2021-38467, CVE-2021-37129, CVE-2021-42542, CVE-2021-20526, CVE-2020-23038, CVE-2021-34584, CVE-2021-24487, CVE-2021-0936, CVE-2020-23036, CVE-2020-23046, CVE-2020-36486, CVE-2021-37221, CVE-2020-22864, CVE-2021-37131, CVE-2020-36496, CVE-2020-23045, CVE-2021-41747, CVE-2021-35233, CVE-2021-39225, CVE-2021-41078, CVE-2021-34787, CVE-2020-7867, CVE-2020-23047, CVE-2021-0631, CVE-2021-29835, CVE-2021-38463, CVE-2021-41177, CVE-2021-41873, CVE-2020-36502, CVE-2020-36495, CVE-2021-38485, CVE-2021-34857, CVE-2021-41145, CVE-2021-24543, CVE-2021-41305, CVE-2021-42538, CVE-2021-34754, CVE-2020-23048, CVE-2020-23060, CVE-2021-34862, CVE-2021-41307, CVE-2020-36488, CVE-2021-22401, CVE-2021-29774, CVE-2021-22405, CVE-2021-42540, CVE-2021-41176, CVE-2021-39223, CVE-2021-24885, CVE-2021-38477, CVE-2021-35236, CVE-2021-0706, CVE-2021-38260, CVE-2021-34859, CVE-2021-38473, CVE-2021-26609, CVE-2021-34595, CVE-2021-0651, CVE-2021-35235, CVE-2021-42258, CVE-2021-41728, CVE-2021-37130, CVE-2021-41178, CVE-2021-31682, CVE-2021-42539, CVE-2021-0630, CVE-2021-41182, CVE-2021-0483, CVE-2021-40527, CVE-2021-42534, CVE-2021-41304, CVE-2021-34863, CVE-2021-42836, CVE-2021-34856, CVE-2021-41308, CVE-2020-23061, CVE-2021-22101, CVE-2021-40125, CVE-2020-23054, CVE-2021-34864, CVE-2021-41157, CVE-2020-23050, CVE-2021-39224, CVE-2020-23051, CVE-2021-31835, CVE-2021-38455, CVE-2021-41105, CVE-2021-34583, CVE-2021-34762, CVE-2021-41183, CVE-2017-20007, CVE-2021-34761, CVE-2021-34794, CVE-2021-34586, CVE-2021-38450, CVE-2020-36497, CVE-2021-34585, CVE-2021-34791, CVE-2021-34596, CVE-2021-41184, CVE-2021-22404, CVE-2021-34790, CVE-2021-42556, CVE-2021-34593, CVE-2020-36485, CVE-2021-24774, CVE-2021-38469, CVE-2021-41158, CVE-2021-37372, CVE-2021-32951, CVE-2020-23043, CVE-2020-28969, CVE-2021-34861, CVE-2021-38471, CVE-2021-40526, CVE-2021-41171, CVE-2020-23042, CVE-2021-42536, CVE-2021-38479, CVE-2021-41306, CVE-2021-3900, CVE-2021-41185, CVE-2021-34764, CVE-2020-36494, CVE-2021-24769

Trust: 4.75

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Sept. 7, 2021, 10:53 a.m.
Vulnerabilities: denial of service, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2021-28139
Related entries in the VARIoT vulnerabilities database: VAR-202110-1690

Trust: 3.75

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 18, 2021, 4:33 p.m.
Vulnerabilities: directory traversal, improper validation, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2021-41103, CVE-2021-41072, CVE-2021-38160, CVE-2021-3653, CVE-2021-42013

Trust: 3.75

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Jan. 11, 2022, 10:54 p.m.
Vulnerabilities: denial of service, resource exhaustion
Affected productsExternal IDs
vendor: cisco model: firepower
vendor: cisco model: firepower threat defense software
vendor: cisco model: asa software
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: cisco firepower management center
vendor: cisco model: cisco adaptive security appliance software
vendor: cisco model: adaptive security appliance software
vendor: cisco model: adaptive security appliance
vendor: cisco model: firepower management center
Related entries in the VARIoT vulnerabilities database: VAR-202105-0569

Trust: 3.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: May 7, 2021, 9:32 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2021-21551

Trust: 4.0

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Jan. 11, 2022, 10:54 p.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: cisco model: firepower
vendor: cisco model: firepower threat defense software
vendor: cisco model: asa software
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: cisco firepower management center
vendor: cisco model: cisco adaptive security appliance software
vendor: cisco model: adaptive security appliance software
vendor: cisco model: adaptive security appliance
vendor: cisco model: firepower management center

Trust: 3.25

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 11, 2021, midnight
Vulnerabilities: authentication bypass, code execution, denial of service
Affected productsExternal IDs
vendor: google model: pixel
vendor: google model: android

Trust: 4.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 12, 2021, 4:31 p.m.
Vulnerabilities: script injection, command injection
Affected productsExternal IDs
vendor: genexis model: platinum 4410
vendor: genexis model: platinum
db: NVD ids: CVE-2020-28188, CVE-2019-12725, CVE-2020-15568, CVE-2021-2900, CVE-2020-25494

Trust: 3.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Sept. 13, 2021, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2021-34346, CVE-2021-28813, CVE-2018-19957, CVE-2021-34344, CVE-2021-28816, CVE-2021-34345, CVE-2021-34343

Trust: 5.25

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Nov. 1, 2021, midnight
Vulnerabilities: code injection, access control vulnerability, directory traversal...
Affected productsExternal IDs
vendor: google model: google chrome
vendor: google model: android
vendor: google model: nexus
vendor: google model: chrome
vendor: mesh model: mesh
vendor: tendacn model: ac9_firmware
vendor: alibaba model: smart app
vendor: netapp model: clustered data ontap
vendor: netapp model: data ontap
vendor: cisco model: webex_meetings
vendor: cisco model: service management
vendor: cisco model: webex video mesh
vendor: cisco model: webex meetings
vendor: cisco model: collaboration_meeting_rooms
vendor: cisco model: webex
vendor: cisco model: cisco unity connection
vendor: cisco model: unified communications manager
vendor: cisco model: unified communications
vendor: cisco model: cisco webex
vendor: cisco model: unity connection
vendor: cisco model: unified communications manager session management edition
vendor: cisco model: unity
vendor: cisco model: umbrella
vendor: cisco model: cisco unified communications manager
vendor: cisco model: catalyst
vendor: cisco model: common services platform collector
vendor: cisco model: nexus
vendor: cisco model: series
vendor: cisco model: cisco unity
vendor: cisco model: cisco webex meetings
vendor: cisco model: information server
vendor: cisco model: unified_communications_manager
vendor: cisco model: series switches
vendor: tenda model: ac9_firmware
vendor: tenda model: tenda ac9
db: NVD ids: CVE-2021-38493, CVE-2021-40115, CVE-2021-33611, CVE-2021-36172, CVE-2018-6122, CVE-2021-37979, CVE-2021-38497, CVE-2021-37996, CVE-2021-38495, CVE-2021-22960, CVE-2021-37981, CVE-2021-34701, CVE-2021-24808, CVE-2021-20839, CVE-2021-24570, CVE-2021-38424, CVE-2021-38422, CVE-2021-24572, CVE-2020-18438, CVE-2021-40128, CVE-2015-10001, CVE-2021-43324, CVE-2021-40848, CVE-2021-27005, CVE-2021-41313, CVE-2020-25912, CVE-2020-20658, CVE-2021-36185, CVE-2021-36794, CVE-2021-33800, CVE-2020-18259, CVE-2021-38356, CVE-2021-31627, CVE-2021-41973, CVE-2020-20982, CVE-2020-18439, CVE-2020-18263, CVE-2021-38418, CVE-2021-36187, CVE-2021-3440, CVE-2021-1500, CVE-2021-33209, CVE-2021-29875, CVE-2021-24742, CVE-2020-23719, CVE-2021-37980, CVE-2021-41238, CVE-2021-39179, CVE-2021-38496, CVE-2020-35249, CVE-2021-41019, CVE-2021-38501, CVE-2020-25873, CVE-2021-40985, CVE-2021-43281, CVE-2021-24809, CVE-2021-42697, CVE-2020-16048, CVE-2017-5123, CVE-2021-38498, CVE-2021-29737, CVE-2021-38847, CVE-2021-36176, CVE-2021-29993, CVE-2021-38502, CVE-2021-23784, CVE-2021-37978, CVE-2021-38416, CVE-2021-37986, CVE-2021-37992, CVE-2021-29991, CVE-2021-27644, CVE-2021-37995, CVE-2021-24781, CVE-2021-41746, CVE-2021-38492, CVE-2021-43266, CVE-2021-36174, CVE-2021-25973, CVE-2021-37977, CVE-2020-36505, CVE-2021-37149, CVE-2021-41874, CVE-2021-37990, CVE-2021-36184, CVE-2021-29888, CVE-2021-24717, CVE-2021-33259, CVE-2021-36697, CVE-2021-31862, CVE-2021-43338, CVE-2020-25911, CVE-2021-37993, CVE-2021-20135, CVE-2021-20838, CVE-2021-31849, CVE-2021-41645, CVE-2021-43270, CVE-2021-24799, CVE-2021-41312, CVE-2020-21574, CVE-2020-20657, CVE-2021-40126, CVE-2020-36503, CVE-2021-26786, CVE-2021-38948, CVE-2018-6125, CVE-2021-27836, CVE-2020-23754, CVE-2021-41748, CVE-2021-33210, CVE-2021-24757, CVE-2021-37991, CVE-2021-35237, CVE-2021-38500, CVE-2021-41187, CVE-2021-1118, CVE-2020-21573, CVE-2018-25019, CVE-2020-23680, CVE-2021-36808, CVE-2021-42917, CVE-2021-37984, CVE-2020-27820, CVE-2021-41585, CVE-2021-22037, CVE-2020-25872, CVE-2021-34773, CVE-2021-39333, CVE-2021-43141, CVE-2021-41022, CVE-2020-6492, CVE-2021-27722, CVE-2021-3765, CVE-2021-37988, CVE-2021-26107, CVE-2020-25881, CVE-2021-37985, CVE-2021-29738, CVE-2021-1120, CVE-2021-40112, CVE-2020-6931, CVE-2021-38491, CVE-2021-24685, CVE-2021-24770, CVE-2021-25742, CVE-2021-37987, CVE-2021-38161, CVE-2020-21572, CVE-2021-38494, CVE-2021-33593, CVE-2021-21688, CVE-2021-41186, CVE-2020-23109, CVE-2020-26705, CVE-2020-23126, CVE-2020-15935, CVE-2020-36504, CVE-2021-31624, CVE-2021-43058, CVE-2021-41310, CVE-2021-34774, CVE-2021-41675, CVE-2020-21139, CVE-2015-20067, CVE-2021-41174, CVE-2021-32595, CVE-2021-37989, CVE-2021-37994, CVE-2021-37983, CVE-2021-37148, CVE-2021-37147, CVE-2020-23718, CVE-2021-23472, CVE-2021-38499, CVE-2021-37982, CVE-2021-43293, CVE-2021-22038, CVE-2021-38420, CVE-2021-39341

Trust: 4.25

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 12, 2021, midnight
Vulnerabilities: default password
Affected productsExternal IDs
vendor: google model: wifi
vendor: google model: home
Related entries in the VARIoT vulnerabilities database: VAR-202110-0209, VAR-202110-0093

Trust: 5.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Jan. 16, 2022, midnight
Vulnerabilities: denial of service, memory corruption, improper memory management...
Affected productsExternal IDs
vendor: cisco model: link layer discovery protocol
vendor: cisco model: identity services engine
vendor: cisco model: ios xe software
vendor: cisco model: dna center
vendor: cisco model: telepresence
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: series smart switches
vendor: cisco model: web security appliance
vendor: cisco model: roomos
vendor: cisco model: small business
vendor: cisco model: ios xe
vendor: cisco model: cisco identity services engine
vendor: cisco model: asyncos
vendor: cisco model: telepresence ce
vendor: cisco model: ip phone
vendor: cisco model: ios xr
vendor: cisco model: series
vendor: cisco model: email security appliance
db: NVD ids: CVE-2021-34779, CVE-2021-34748, CVE-2021-34735, CVE-2021-1594, CVE-2021-34780, CVE-2021-34710
Related entries in the VARIoT vulnerabilities database: VAR-202109-1067

Trust: 4.5

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Jan. 14, 2021, midnight
Vulnerabilities: path traversal
Affected productsExternal IDs
vendor: netgear model: gs752tpp
vendor: netgear model: gs724tpv2
vendor: netgear model: gs728tpv2
vendor: netgear model: gs752tpv2
vendor: netgear model: gs728tppv2
vendor: netgear model: gs750e
vendor: google model: home
vendor: google model: chrome
db: NVD ids: CVE-2021-40867

Trust: 3.0

Fetched: Nov. 9, 2021, 12:59 p.m., Published: Oct. 15, 2021, 8:17 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: siemens model: ruggedcom