VARIoT news about IoT security

Trust: 4.75

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Aug. 16, 2021, 10:36 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: asustek model: wireless routers
vendor: realtek model: realtek sdk
db: NVD ids: CVE-2021-35394, CVE-2021-35393, CVE-2021-35392, CVE-2021-35395
Related entries in the VARIoT vulnerabilities database: VAR-202108-2172, VAR-202108-1057

Trust: 4.0

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 14, 2021, 2:55 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: macos
db: NVD ids: CVE-2021-30858, CVE-2021-30860

Trust: 4.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Aug. 15, 2021, 3:01 p.m.
Vulnerabilities: denial of service, injection attack, cross-site scripting...
Affected productsExternal IDs
vendor: apple model: watch
vendor: google model: wifi
vendor: google model: home
vendor: essential model: phone
Related entries in the VARIoT vulnerabilities database: VAR-202108-1057, VAR-202108-2172

Trust: 4.5

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 14, 2021, 1:28 p.m.
Vulnerabilities: code execution, integer overflow
Affected productsExternal IDs
vendor: apple model: webkit
vendor: apple model: ipad
vendor: apple model: ipod touch
vendor: apple model: watchos
vendor: apple model: ipad air
vendor: apple model: safari
vendor: apple model: macos
vendor: apple model: iphone
vendor: google model: android
db: NVD ids: CVE-2021-30860, CVE-2019-3568, CVE-2021-30858

Trust: 4.75

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 16, 2022, midnight
Vulnerabilities: cross-site request forgery, request forgery, denial of service...
Affected productsExternal IDs
vendor: realtek model: realtek sdk
db: NVD ids: CVE-2021-32941

Trust: 5.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 7, 2022, 7:33 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: node.js model: node.js
Related entries in the VARIoT vulnerabilities database: VAR-202110-0829, VAR-202103-1464, VAR-202110-1687, VAR-202110-0498, VAR-202103-1463, VAR-202012-1527

Trust: 4.0

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Oct. 16, 2021, midnight
Vulnerabilities: use after free, feature bypass, denial of service...
Affected productsExternal IDs
db: NVD ids: CVE-2021-40489, CVE-2021-41355, CVE-2021-40475, CVE-2021-40480, CVE-2021-41346, CVE-2021-40450, CVE-2021-40487, CVE-2021-38672, CVE-2021-40454, CVE-2021-3449, CVE-2021-38663, CVE-2021-40460, CVE-2021-40486, CVE-2021-26441, CVE-2021-36970, CVE-2021-36953, CVE-2021-40461, CVE-2021-37978, CVE-2021-40443, CVE-2021-40463, CVE-2021-40482, CVE-2021-41344, CVE-2021-41332, CVE-2021-40462, CVE-2021-40472, CVE-2021-40476, CVE-2021-41354, CVE-2021-40471, CVE-2021-41352, CVE-2021-40455, CVE-2021-37976, CVE-2021-41338, CVE-2021-41345, CVE-2021-41334, CVE-2021-40474, CVE-2021-37980, CVE-2021-41331, CVE-2021-40449, CVE-2021-41363, CVE-2021-26427, CVE-2021-37975, CVE-2021-41340, CVE-2021-40468, CVE-2021-40456, CVE-2021-41330, CVE-2021-40488, CVE-2021-41353, CVE-2021-40467, CVE-2021-41347, CVE-2021-41342, CVE-2021-34453, CVE-2021-40466, CVE-2021-41336, CVE-2021-40479, CVE-2021-40483, CVE-2021-40481, CVE-2021-40469, CVE-2021-37977, CVE-2021-41337, CVE-2021-41343, CVE-2021-41357, CVE-2021-41348, CVE-2021-3450, CVE-2021-40484, CVE-2021-41335, CVE-2021-40457, CVE-2020-1971, CVE-2021-40478, CVE-2021-40470, CVE-2021-37979, CVE-2021-40485, CVE-2021-41350, CVE-2021-26442, CVE-2021-41339, CVE-2021-40477, CVE-2021-38662, CVE-2021-41361, CVE-2021-40473, CVE-2021-40465, CVE-2021-37974, CVE-2021-40464
Related entries in the VARIoT vulnerabilities database: VAR-202001-1034, VAR-201604-0660, VAR-201605-0004, VAR-202105-0363, VAR-202108-1919, VAR-201611-0385, VAR-202105-0365, VAR-202104-0750, VAR-201910-0902, VAR-202107-1010, VAR-201810-0977, VAR-202109-1313, VAR-202104-0753, VAR-202109-1311, VAR-202102-0786, VAR-202109-1419, VAR-201806-1026, VAR-202012-0746, VAR-201905-0764, VAR-202109-1316, VAR-202102-0898, VAR-202102-0290, VAR-201803-1387, VAR-201901-0351, VAR-202112-0566, VAR-201709-1229, VAR-202109-1307, VAR-202106-0161, VAR-202108-1057, VAR-202007-0064, VAR-202106-1493, VAR-202109-1575, VAR-201903-0447, VAR-202110-1687, VAR-202109-1315, VAR-202007-1057, VAR-202007-1175, VAR-202007-1393, VAR-202012-0781, VAR-202004-1234, VAR-201909-0563, VAR-202010-1052, VAR-202108-2172, VAR-202101-0529, VAR-202008-0248, VAR-202107-1170, VAR-202108-1374, VAR-202012-0782, VAR-201808-0384, VAR-202006-1614, VAR-201907-1641, VAR-202105-1126, VAR-202107-1357, VAR-202106-1536, VAR-202002-1447, VAR-202106-0639, VAR-201912-0828, VAR-202002-0712, VAR-201906-0815, VAR-201712-0864, VAR-201703-0755, VAR-201703-1246, VAR-201906-0818, VAR-202002-0403, VAR-202003-0417, VAR-201708-1312, VAR-202012-0977, VAR-202109-1380, VAR-202006-1646, VAR-202003-0573, VAR-202104-0768, VAR-202104-0757, VAR-202110-1691, VAR-202109-1802, VAR-202108-1914, VAR-202104-1341, VAR-202110-1690, VAR-202010-0585, VAR-202104-0755, VAR-202007-0327, VAR-202110-0332, VAR-202104-0756, VAR-202106-1707, VAR-202006-1615, VAR-202106-1494, VAR-202112-1044, VAR-202007-0079, VAR-202008-0193, VAR-202109-1420, VAR-202106-1708, VAR-202109-1909, VAR-202104-0647, VAR-202103-0654, VAR-202104-0751

Trust: 5.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 10, 2022, midnight
Vulnerabilities: os command injection, input validation error, authentication bypass...
Affected productsExternal IDs
vendor: pulse secure model: pulse connect secure
vendor: pulse secure model: connect secure
vendor: pulse secure model: policy secure
vendor: cisco model: ios xr software
vendor: cisco model: ip phone
vendor: cisco model: cisco hyperflex
vendor: cisco model: asa 5500
vendor: cisco model: rv320
vendor: cisco model: rv325
vendor: cisco model: ios xe
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco ios xe
vendor: cisco model: series industrial security appliance
vendor: cisco model: router
vendor: cisco model: series
vendor: cisco model: ios 12.1
vendor: cisco model: catalyst
vendor: cisco model: series routers
vendor: cisco model: industrial security appliance
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: ios xe software
vendor: cisco model: rv325 dual gigabit wan vpn
vendor: cisco model: firepower 9300
vendor: cisco model: hyperflex
vendor: cisco model: series switches
vendor: cisco model: ip phones
vendor: cisco model: small business
vendor: cisco model: small business rv320
vendor: cisco model: 7600 series
vendor: cisco model: adaptive security virtual appliance
vendor: cisco model: firepower
vendor: cisco model: cisco small business rv320
vendor: cisco model: security manager
vendor: cisco model: cisco small business
vendor: cisco model: routers
vendor: cisco model: cisco ios xr
vendor: cisco model: asa software
vendor: cisco model: ios software
vendor: cisco model: cisco ios
vendor: cisco model: cisco catalyst 6500 series
vendor: cisco model: ftd virtual
vendor: cisco model: firepower 2100
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco 7600 series
vendor: cisco model: catalyst 6500 series
vendor: cisco model: asa 5500 series
vendor: cisco model: meeting
vendor: cisco model: nexus
vendor: cisco model: 1000v
vendor: cisco model: management appliance
vendor: cisco model: asa 1000v cloud firewall
vendor: cisco model: catalyst 6500
vendor: cisco model: ios xr
vendor: apple model: safari
vendor: apple model: macos
vendor: apple model: webkit
vendor: apple model: watchos
vendor: d-link model: router
vendor: d-link model: dir-825
vendor: d-link model: dir-825 r1
vendor: d-link model: dns-320
vendor: palo alto networks model: palo alto networks
vendor: palo alto networks model: firewall
vendor: palo alto networks model: networks
vendor: palo alto networks model: pan-os
vendor: palo alto networks model: ssl vpn
vendor: netgear model: router
vendor: netgear model: prosafe
vendor: netgear model: jgs516pe
vendor: citrix model: gateway
vendor: citrix model: application delivery controller
vendor: citrix model: hypervisor
vendor: citrix model: sdwan wan-op
vendor: citrix model: citrix sdwan wan-op
vendor: citrix model: secure gateway
vendor: freetype model: freetype
vendor: imagemagick model: imagemagick
vendor: mobileiron model: sentry
vendor: embedthis model: goahead
vendor: sumavision model: enhanced multimedia router
vendor: draytek model: vigor3900
vendor: draytek model: vigor2960 1.3.1_beta
vendor: draytek model: vigor300b
vendor: draytek model: vigor2960
vendor: draytek model: vigor
vendor: draytek model: routers
vendor: draytek model: vigor300b 1.3.3_beta
vendor: draytek model: vigor3900 1.4.4_beta
vendor: palo model: palo alto networks
vendor: palo model: firewall
vendor: palo model: networks
vendor: palo model: pan-os
vendor: palo model: ssl vpn
vendor: symantec model: antivirus
vendor: symantec model: symantec messaging gateway
vendor: symantec model: messaging gateway
vendor: vbulletin model: vbulletin
vendor: realtek model: realtek sdk
vendor: pulse model: secure pulse connect secure
vendor: sonicwall model: sma1000
vendor: sonicwall model: email security
vendor: sonicwall model: sma100
vendor: sonicwall model: ssl vpn
vendor: zoho model: manageengine desktop central
vendor: zoho model: manageengine adselfservice plus
vendor: zoho model: manageengine servicedesk plus
vendor: nagios model: nagios xi
vendor: solarwinds model: serv-u
vendor: google model: chrome
vendor: google model: google chrome
vendor: google model: android
vendor: google model: nexus
vendor: trend model: antivirus
vendor: trend model: trend micro antivirus
vendor: trend model: micro trend micro
vendor: trend model: security
vendor: trend model: micro officescan
vendor: trend model: worry-free business security
vendor: trend model: officescan
vendor: trend model: micro antivirus
vendor: tenda model: ac15 ac1900
vendor: tenda model: ac10
vendor: tenda model: router
vendor: tenda model: tenda router
vendor: tenda model: ac15
vendor: tenda model: ac11
vendor: mikrotik model: winbox
vendor: mikrotik model: router
vendor: mikrotik model: mikrotik router
vendor: mikrotik model: routeros
vendor: mikrotik model: routers
vendor: mikrotik model: mikrotik
vendor: zoho corporation model: manageengine desktop central
vendor: zoho corporation model: manageengine adselfservice plus
vendor: zoho corporation model: manageengine servicedesk plus
vendor: samsung model: note
vendor: samsung model: mobile
vendor: samsung model: samsung
vendor: hikvision model: hikvision
vendor: hikvision model: camera
vendor: trend micro model: antivirus
vendor: trend micro model: trend micro antivirus
vendor: trend micro model: micro trend micro
vendor: trend micro model: security
vendor: trend micro model: micro officescan
vendor: trend micro model: worry-free business security
vendor: trend micro model: officescan
vendor: trend micro model: micro antivirus
vendor: openslp model: openslp
vendor: netis model: wf2419
vendor: buffalo model: router
vendor: buffalo model: buffalo wsr-2533dhpl2
vendor: buffalo model: wsr-2533dhp3
vendor: buffalo model: wsr-2533dhpl2
vendor: sophos model: mobile
vendor: sophos model: xg firewall
vendor: amcrest model: amcrest
db: NVD ids: CVE-2020-2555, CVE-2016-3976, CVE-2021-21224, CVE-2021-31207, CVE-2020-17141, CVE-2010-5326, CVE-2021-38003, CVE-2019-0803, CVE-2021-1906, CVE-2019-3396, CVE-2017-16651, CVE-2021-36948, CVE-2020-0686, CVE-2020-8260, CVE-2021-22017, CVE-2021-27085, CVE-2020-1269, CVE-2016-9563, CVE-2021-1905, CVE-2020-10221, CVE-2020-8196, CVE-2020-14750, CVE-2021-1870, CVE-2017-0143, CVE-2021-26854, CVE-2019-2215, CVE-2021-34527, CVE-2021-37976, CVE-2020-0938, CVE-2018-14558, CVE-2021-30663, CVE-2021-1879, CVE-2021-30661, CVE-2020-16017, CVE-2021-1732, CVE-2016-3235, CVE-2019-0594, CVE-2020-1350, CVE-2021-30761, CVE-2020-1054, CVE-2021-21972, CVE-2020-24557, CVE-2020-1020, CVE-2021-27072, CVE-2018-0797, CVE-2021-27561, CVE-2020-6819, CVE-2019-1221, CVE-2021-37415, CVE-2017-9822, CVE-2019-1215, CVE-2019-1214, CVE-2013-3900, CVE-2020-6287, CVE-2020-1380, CVE-2018-0296, CVE-2020-27950, CVE-2019-0211, CVE-2016-0167, CVE-2020-17087, CVE-2018-13383, CVE-2019-10149, CVE-2020-7961, CVE-2021-27057, CVE-2020-0674, CVE-2021-30666, CVE-2020-0041, CVE-2021-22900, CVE-2018-4878, CVE-2016-0143, CVE-2021-20016, CVE-2021-22005, CVE-2019-13608, CVE-2021-38648, CVE-2019-9670, CVE-2021-38645, CVE-2021-40539, CVE-2021-21206, CVE-2021-27103, CVE-2021-23874, CVE-2020-25506, CVE-2018-0171, CVE-2021-33768, CVE-2019-1653, CVE-2021-30554, CVE-2020-17132, CVE-2021-28663, CVE-2020-1570, CVE-2020-1237, CVE-2015-7450, CVE-2021-27562, CVE-2021-44228, CVE-2021-26857, CVE-2020-17117, CVE-2017-1000486, CVE-2017-9805, CVE-2019-7238, CVE-2021-27078, CVE-2019-16759, CVE-2018-7600, CVE-2020-16010, CVE-2020-11738, CVE-2020-16846, CVE-2021-42258, CVE-2021-35394, CVE-2021-4102, CVE-2021-31196, CVE-2010-1871, CVE-2020-1275, CVE-2021-30657, CVE-2021-35464, CVE-2015-4852, CVE-2018-15811, CVE-2019-0193, CVE-2021-34514, CVE-2020-1246, CVE-2020-4430, CVE-2020-3950, CVE-2021-31206, CVE-2020-8243, CVE-2020-11261, CVE-2020-8644, CVE-2020-6820, CVE-2020-1262, CVE-2021-21148, CVE-2021-30860, CVE-2021-22894, CVE-2019-18187, CVE-2020-10987, CVE-2019-20085, CVE-2019-11510, CVE-2020-4428, CVE-2019-1367, CVE-2019-3398, CVE-2021-30563, CVE-2016-0165, CVE-2017-9248, CVE-2018-4939, CVE-2020-8599, CVE-2020-10189, CVE-2020-8655, CVE-2020-10148, CVE-2021-31199, CVE-2020-14883, CVE-2021-28664, CVE-2021-30116, CVE-2020-1032, CVE-2018-0812, CVE-2020-0710, CVE-2020-17496, CVE-2021-36955, CVE-2021-43890, CVE-2020-11651, CVE-2021-38647, CVE-2017-0144, CVE-2019-6223, CVE-2021-40449, CVE-2019-0859, CVE-2020-0712, CVE-2021-30665, CVE-2020-3452, CVE-2021-27065, CVE-2020-3569, CVE-2019-15949, CVE-2019-0808, CVE-2020-0970, CVE-2020-8195, CVE-2021-42321, CVE-2018-0802, CVE-2020-5902, CVE-2018-18325, CVE-2020-27930, CVE-2021-38000, CVE-2021-26084, CVE-2020-3161, CVE-2017-12149, CVE-2019-16256, CVE-2019-5544, CVE-2021-1498, CVE-2017-8759, CVE-2019-18935, CVE-2020-8467, CVE-2020-3580, CVE-2020-10199, CVE-2020-14871, CVE-2020-17144, CVE-2021-30858, CVE-2019-7609, CVE-2021-30632, CVE-2020-29557, CVE-2020-1472, CVE-2021-33771, CVE-2018-15961, CVE-2020-0673, CVE-2016-3643, CVE-2021-35395, CVE-2021-30869, CVE-2020-0601, CVE-2020-1307, CVE-2016-0185, CVE-2019-2725, CVE-2016-3718, CVE-2016-4437, CVE-2021-26411, CVE-2020-27932, CVE-2020-3952, CVE-2021-36742, CVE-2018-14847, CVE-2020-1266, CVE-2021-21017, CVE-2019-1426, CVE-2020-1276, CVE-2018-2380, CVE-2019-9978, CVE-2021-21985, CVE-2019-0797, CVE-2019-1458, CVE-2019-19781, CVE-2020-9818, CVE-2019-11580, CVE-2020-0688, CVE-2020-5849, CVE-2019-13272, CVE-2021-31755, CVE-2019-0708, CVE-2021-31979, CVE-2021-37973, CVE-2021-38649, CVE-2020-1555, CVE-2019-0604, CVE-2020-4427, CVE-2020-1036, CVE-2016-7255, CVE-2021-33739, CVE-2021-27059, CVE-2020-8515, CVE-2020-17142, CVE-2021-1675, CVE-2021-22204, CVE-2021-44077, CVE-2019-7481, CVE-2020-5847, CVE-2020-17530, CVE-2021-27102, CVE-2020-3118, CVE-2016-3715, CVE-2018-13379, CVE-2019-9082, CVE-2017-17562, CVE-2017-5638, CVE-2017-11774, CVE-2017-7269, CVE-2018-13382, CVE-2021-22205, CVE-2021-27104, CVE-2019-1253, CVE-2021-37975, CVE-2021-1698, CVE-2020-1040, CVE-2021-22502, CVE-2020-3566, CVE-2019-19356, CVE-2017-0146, CVE-2019-1278, CVE-2020-10181, CVE-2020-1041, CVE-2021-35211, CVE-2021-26412, CVE-2020-6207, CVE-2020-0683, CVE-2020-8468, CVE-2020-6418, CVE-2020-1273, CVE-2019-10758, CVE-2021-1497, CVE-2012-3152, CVE-2021-24108, CVE-2017-6327, CVE-2020-29583, CVE-2021-27101, CVE-2021-28550, CVE-2020-16009, CVE-2020-0711, CVE-2020-17463, CVE-2020-16013, CVE-2020-0767, CVE-2021-30713, CVE-2021-27860, CVE-2020-0713, CVE-2020-9859, CVE-2021-21166, CVE-2021-33742, CVE-2021-30551, CVE-2020-12271, CVE-2020-0069, CVE-2019-0863, CVE-2021-20090, CVE-2020-0878, CVE-2021-21193, CVE-2020-3992, CVE-2021-26858, CVE-2021-20023, CVE-2020-8193, CVE-2017-11884, CVE-2021-41773, CVE-2021-40438, CVE-2020-25213, CVE-2020-1316, CVE-2012-0158, CVE-2021-22893, CVE-2019-1303, CVE-2019-15752, CVE-2021-36741, CVE-2019-18988, CVE-2021-36942, CVE-2020-5735, CVE-2020-0986, CVE-2019-17026, CVE-2021-22899, CVE-2017-11882, CVE-2020-1043, CVE-2020-11652, CVE-2021-1647, CVE-2017-0145, CVE-2021-28310, CVE-2021-44515, CVE-2019-0541, CVE-2021-34523, CVE-2019-1428, CVE-2021-34448, CVE-2021-42292, CVE-2019-1429, CVE-2021-42013, CVE-2018-8653, CVE-2020-26919, CVE-2021-20021, CVE-2020-1274, CVE-2020-0968, CVE-2021-22506, CVE-2019-8394, CVE-2020-15505, CVE-2020-1147, CVE-2019-17558, CVE-2019-1579, CVE-2020-1264, CVE-2020-15999, CVE-2017-0199, CVE-2021-30807, CVE-2021-20022, CVE-2017-0148, CVE-2015-1641, CVE-2021-31955, CVE-2019-11539, CVE-2021-30633, CVE-2021-36260, CVE-2019-11634, CVE-2019-0685, CVE-2020-9819, CVE-2019-4716, CVE-2021-31201, CVE-2021-34470, CVE-2018-6789, CVE-2020-4006, CVE-2021-26855, CVE-2019-1427, CVE-2020-8657, CVE-2018-20062, CVE-2021-44168, CVE-2020-0646, CVE-2018-0798, CVE-2020-12812, CVE-2019-5591, CVE-2021-34473, CVE-2021-30762, CVE-2018-8643, CVE-2020-1464, CVE-2020-14882, CVE-2014-1812, CVE-2020-6572, CVE-2021-31956, CVE-2021-40444, CVE-2021-1782, CVE-2020-1042, CVE-2020-8816, CVE-2021-22986, CVE-2021-21220, CVE-2018-11776, CVE-2021-1871

Trust: 5.5

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 3, 2022, midnight
Vulnerabilities: denial of service, process crash
Affected productsExternal IDs
vendor: cisco systems model: cisco systems
vendor: cisco systems model: nx-os
vendor: cisco systems model: nx-os software
vendor: cisco systems model: cisco nx-os
vendor: cisco model: cisco systems
vendor: cisco model: nx-os
vendor: cisco model: nx-os software
vendor: cisco model: cisco nx-os
db: NVD ids: CVE-2021-1588

Trust: 3.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 20, 2021, midnight
Vulnerabilities: security bypass
Affected productsExternal IDs
db: NVD ids: CVE-2021-1678

Trust: 3.0

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 27, 2021, 3:04 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: asus model: asus
Related entries in the VARIoT vulnerabilities database: VAR-202108-1057, VAR-202108-2172

Trust: 4.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 14, 2021, 6:45 p.m.
Vulnerabilities: integer overflow, code execution, buffer overflow
Affected productsExternal IDs
vendor: apple model: iphone
vendor: apple model: ipad
vendor: apple model: webkit
vendor: apple model: macbook
vendor: apple model: watchos
vendor: apple model: watch
vendor: apple model: macos
vendor: apple model: safari
db: NVD ids: CVE-2021-30860, CVE-2021-30858

Trust: 3.5

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 22, 2021, 12:27 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: apple model: macos
vendor: apple model: safari

Trust: 3.25

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Sept. 14, 2021, 10:05 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: iphone

Trust: 4.5

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Aug. 26, 2021, 9:21 a.m.
Vulnerabilities: command injection, memory corruption
Affected productsExternal IDs
vendor: netgear model: router
vendor: belkin model: router
vendor: realtek model: realtek sdk
vendor: buffalo model: router
vendor: d-link model: router
vendor: asustek model: router
db: NVD ids: CVE-2021-35392, CVE-2021-35395, CVE-2021-35393, CVE-2021-35394

Trust: 3.75

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Oct. 12, 2021, 3:27 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: medtronic model: paradigm
vendor: medtronic model: minimed 508

Trust: 4.75

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Aug. 17, 2021, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: apple model: watch
db: NVD ids: CVE-2021-28372

Trust: 5.0

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 14, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: realtek model: realtek sdk
db: NVD ids: CVE-2021-28372

Trust: 3.5

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Jan. 3, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco systems model: cisco systems
vendor: cisco systems model: cisco email security appliance
vendor: cisco systems model: asyncos software
vendor: cisco systems model: cisco asyncos
vendor: cisco systems model: email security appliance
vendor: cisco systems model: asyncos
vendor: cisco model: cisco systems
vendor: cisco model: cisco email security appliance
vendor: cisco model: asyncos software
vendor: cisco model: cisco asyncos
vendor: cisco model: email security appliance
vendor: cisco model: asyncos
db: NVD ids: CVE-2021-1534
Related entries in the VARIoT vulnerabilities database: VAR-202109-1909

Trust: 3.0

Fetched: Nov. 4, 2021, 1:02 p.m., Published: Oct. 13, 2021, 7 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2021-40444