Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sonitrol eaccess vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2468
The S2 Security NetBox 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, uses a weak hash algorithm for storing the Administrator password, which makes it easier for context-dependent malicious users to obtain privileged access by recovering the clea...
S2sys Netbox 3.3
S2sys Netbox 2.5
Linearcorp Emerge 50
Linearcorp Emerge 5000
Sonitrol Eaccess
NA
CVE-2010-2466
The S2 Security NetBox, possibly 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, does not properly prevent downloading of database backups, which allows remote malicious users to obtain sensitive information via requests for full_*.dar files with p...
S2sys Netbox 3.3
S2sys Netbox 2.5
Linearcorp Emerge 50
Linearcorp Emerge 5000
Sonitrol Eaccess
NA
CVE-2010-2465
The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote malicious users to download node logs, photographs of persons, and ba...
S2sys Netbox 4.0
S2sys Netbox 2.5
S2sys Netbox 3.3
Linearcorp Emerge 50
Linearcorp Emerge 5000
Sonitrol Eaccess
NA
CVE-2010-2467
The S2 Security NetBox, possibly 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, does not require setting a password for the FTP server that stores database backups, which makes it easier for remote malicious users to download backup files via unsp...
S2sys Netbox 4.0
S2sys Netbox 2.5
S2sys Netbox 3.3
Linearcorp Emerge 50
Linearcorp Emerge 5000
Sonitrol Eaccess
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started