Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
webgate edvr manager - vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2015-2100
Multiple stack-based buffer overflows in WebGate eDVR Manager and Control Center allow remote malicious users to execute arbitrary code via unspecified vectors to the (1) TCPDiscover or (2) TCPDiscover2 function in the WESPDiscovery.WESPDiscoveryCtrl.1 control.
Webgate Edvr Manager -
Webgate Control Center -
8.8
CVSSv3
CVE-2015-2098
Multiple stack-based buffer overflows in WebGate eDVR Manager allow remote malicious users to execute arbitrary code via unspecified vectors to the (1) Connect, (2) ConnectEx, or (3) ConnectEx2 function in the WESPEvent.WESPEventCtrl.1 control; (4) AudioOnlySiteChannel function i...
Webgateinc Edvr Manager -
3 EDB exploits
NA
CVE-2015-2097
Multiple buffer overflows in WebGate Embedded Standard Protocol (WESP) SDK allow remote malicious users to execute arbitrary code via unspecified vectors to the (1) LoadImage or (2) LoadImageEx function in the WESPMonitor.WESPMonitorCtrl.1 control, (3) ChangePassword function in ...
Webgate Webgate Embedded Standard Protocol Sdk -
3 EDB exploits
NA
CVE-2015-2095
Heap-based buffer overflow in the SetConnectInfo function in the WESPPTZ.WESPPTZCtrl.1 ActiveX control in WebGate eDVR Manager allows remote malicious users to execute arbitrary code via crafted arguments.
Webgateinc Edvr Manager 2.6.4
NA
CVE-2015-2096
Use-after-free vulnerability in the Connect function in the WESPMonitor.WESPMonitorCtrl.1 ActiveX control in WebGate eDVR Manager allows remote malicious users to execute arbitrary code via an invalid IP address and a page reload.
Webgateinc Edvr Manager 2.6.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started