Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intelliantech aptus web 1.24 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-7980
Intellian Aptus Web 1.24 allows remote malicious users to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
Intelliantech Aptus Web 1.24
1 Github repository
9.8
CVSSv3
CVE-2020-8000
Intellian Aptus Web 1.24 has a hardcoded password of 12345678 for the intellian account.
Intelliantech Aptus Web 1.24
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started