Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digit vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-16170
Use of Hard-coded Credentials in temi Robox OS before 120, temi Android app up to 1.3.7931 allows remote malicious users to listen in on any ongoing calls between temi robots and their users if they can brute-force/guess a six-digit value via unspecified vectors.
Robotemi Temi
7.5
CVSSv3
CVE-2020-10876
The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) does not correctly implement its timeout on the four-digit verification code that is required for resetting passwords, nor does it properly restrict excessive verification attempts. This allows an...
Oklok Project Oklok 3.1.1
7.5
CVSSv3
CVE-2019-7579
An issue exists on Linksys WRT1900ACS 1.0.3.187766 devices. An ability exists for an unauthenticated user to browse a confidential ui/1.0.99.187766/dynamic/js/setup.js.localized file on the router's webserver, allowing for an malicious user to identify possible passwords tha...
Linksys Wrt1900acs Firmware 1.0.3.187766
7.5
CVSSv3
CVE-2017-9818
The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for malicious users to obtain access.
Npci Bharat Interface For Money \\(bhim\\) 1.3
7.5
CVSSv3
CVE-2016-0797
Multiple integer overflows in OpenSSL 1.0.1 prior to 1.0.1s and 1.0.2 prior to 1.0.2g allow remote malicious users to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandle...
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.1
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.1r
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.1p
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1n
Openssl Openssl 1.0.1q
Openssl Openssl 1.0.1e
Openssl Openssl 1.0.1l
Openssl Openssl 1.0.1f
7.5
CVSSv3
CVE-2008-2020
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (...
My123tkshop E-commerce-suite 0.9.1
Phpmybittorrent Phpmybittorrent 1.2.2
Webze Webze 0.5.9
E107 E107 0.7.11
Labgab Labgab 1.1
Phpnuke Php-nuke 7.0
Torrentflux Project Torrentflux 2.3
Phpnuke Php-nuke 8.1
Opendb Opendb 1.5.0
7.4
CVSSv3
CVE-2023-43650
JumpServer is an open source bastion host. The verification code for resetting user's password is vulnerable to brute-force attacks due to the absence of rate limiting. JumpServer provides a feature allowing users to reset forgotten passwords. Affected users are sent a 6-dig...
Fit2cloud Jumpserver
6.7
CVSSv3
CVE-2019-1803
A vulnerability in the filesystem management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges as the root user on an affected device. Th...
Cisco Nexus 9000 Series Application Centric Infrastructure -
6.5
CVSSv3
CVE-2022-30312
The Trend Controls IC protocol through 2022-05-06 allows Cleartext Transmission of Sensitive Information. According to FSCT-2022-0050, there is a Trend Controls Inter-Controller (IC) protocol cleartext transmission of credentials issue. The affected components are characterized a...
Honeywell Trend Iq412 Firmware
Honeywell Trend Iq411 Firmware
Honeywell Trend Iq422 Firmware
Honeywell Trend Iq4nc Firmware
Honeywell Trend Iq4e Firmware
6.5
CVSSv3
CVE-2014-7222
Buffer overflow in TeamSpeak Client 3.0.14 and previous versions allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash)...
Teamspeak Teamspeak3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »