Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
51 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2022-34390
Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
Dell Alienware Area-51 R5 Firmware
Dell Alienware Area-51 R4 Firmware
7.8
CVSSv3
CVE-2022-34391
Dell Client BIOS Versions prior to the remediated version contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
Dell Alienware Area-51 R5 Firmware
Dell Alienware Area-51 R4 Firmware
9.8
CVSSv3
CVE-2018-1164
This vulnerability allows remote malicious users to cause a denial-of-service condition on vulnerable installations of ZyXEL P-870H-51 DSL Router 1.00(AWG.3)D5. Authentication is not required to exploit this vulnerability. The specific flaw exists within numerous exposed CGI endp...
Zyxel P-870h-51 Firmware 1.00(awg.3)d5
5.3
CVSSv3
CVE-2021-24046
A logic flaw in Ray-Ban® Stories device software allowed some parameters like video capture duration limit to be modified through the Facebook View application. This issue affected versions of device software prior to 2107460.6810.0.
Ray-ban Stories Rw4003 65582v 48-23 Firmware
Ray-ban Stories Rw4002 601/71 50-22 Firmware
Ray-ban Stories Rw4005 656013 51-20 Firmware
Ray-ban Stories Rw4005 6563m3 51-20 Firmware
NA
CVE-2012-0917
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Analyzer 02-01, 02-51 through 02-51-01, and 02-53 through 02-53-02 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Hitachi It Operations Analyzer 02-53
Hitachi It Operations Analyzer 02-51-01
Hitachi It Operations Analyzer 02-53-02
Hitachi It Operations Analyzer 02-01
Hitachi It Operations Analyzer 02-53-01
Hitachi It Operations Analyzer 02-51
5.5
CVSSv3
CVE-2016-2016
Base-VxFS-50 B.05.00.01 through B.05.00.02, Base-VxFS-501 B.05.01.0 through B.05.01.03, and Base-VxFS-51 B.05.10.00 through B.05.10.02 on HPE HP-UX 11iv3 with VxFS 5.0, VxFS 5.0.1, and VxFS 5.1SP1 mishandles ACL inheritance for default:class: entries, default:other: entries, and ...
Hp Base-vxfs-50 B.05.00.01
Hp Base-vxfs-50 B.05.00.02
Hp Base-vxfs-501 B.05.01.0
Hp Base-vxfs-501 B.05.01.01
Hp Base-vxfs-501 B.05.01.03
Hp Base-vxfs-51 B.05.10.00
Hp Base-vxfs-51 B.05.10.02
NA
CVE-2006-3290
HTTP server in Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(51) stores sensitive information under the web root with insufficient access control, which allows remote malicious users to obtain usernames and directory paths via a direct URL request.
Cisco Wireless Control System
NA
CVE-2006-3285
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(51) uses an undocumented, hard-coded username and password, which allows remote authenticated users to read, and possibly modify, sensitive configuration data (aka bugs CSCsd15955).
Cisco Wireless Control System
NA
CVE-2006-3288
Unspecified vulnerability in the TFTP server in Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(51), when configured to use a directory path name that contains a space character, allows remote authenticated users to read and overwrite arbitrary files via un...
Cisco Wireless Control System
NA
CVE-2006-3289
Cross-site scripting (XSS) vulnerability in the login page of the HTTP interface for the Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(51) allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors involving a "malic...
Cisco Wireless Control System
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »