Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alarm vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv3
CVE-2015-8253
The Frontel protocol prior to 3 on RSI Video Technologies Videofied devices sets up AES encryption but sends all traffic in cleartext, which allows remote malicious users to obtain sensitive (1) message or (2) MJPEG video data by sniffing the network.
Rsi Video Technologies Frontel Protocol
5.9
CVSSv3
CVE-2015-8252
The Frontel protocol prior to 3 on RSI Video Technologies Videofied devices sends a cleartext serial number, which allows remote malicious users to determine a hardcoded key by sniffing the network and performing a "jumbled up" calculation with this number.
Rsi Video Technologies Frontel Protocol
NA
CVE-2021-39276
Fortress S03 WiFi Home Security System unauthenticated API access. If a malicious actor knows a user’s email address, they can use it to query the cloud-based API to return an International Mobile Equipment Identity (IMEI) number, which appears to also serve as the device...
6.8
CVSSv3
CVE-2014-5431
Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. Th...
Baxter Sigma Spectrum Infusion System Firmware 6.05
NA
CVE-2008-3081
Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated administrators to exe...
Avaya Messaging Storage Server 3.1
Avaya Messaging Storage Server 4.0
Avaya Messaging Storage Server 3
9.8
CVSSv3
CVE-2018-17916
InduSoft Web Studio versions before 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions before 2017 SP2. A remote attacker could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related action...
Aveva Indusoft Web Studio 8.0
Aveva Indusoft Web Studio 7.1
Aveva Indusoft Web Studio 8.1
Aveva Indusoft Web Studio 6.1
Aveva Edge 8.1
Aveva Intouch Machine Edition 2014 R2
NA
CVE-2010-2466
The S2 Security NetBox, possibly 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, does not properly prevent downloading of database backups, which allows remote malicious users to obtain sensitive information via requests for full_*.dar files with p...
S2sys Netbox 3.3
S2sys Netbox 2.5
Linearcorp Emerge 50
Linearcorp Emerge 5000
Sonitrol Eaccess
7.5
CVSSv3
CVE-2022-22211
A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged malicious user to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causin...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
6.5
CVSSv3
CVE-2017-9657
Under specific 802.11 network conditions, a partial re-association of the Philips IntelliVue MX40 Version B.06.18 WLAN monitor to the central monitoring station is possible. In this state, the central monitoring station can indicate the MX40 is not connected or associated to the ...
Philips Intellivue Mx40 Firmware
7.8
CVSSv3
CVE-2021-43983
WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsing project files, which may allow an malicious user to execute arbitrary code.
We-con Levistudiou
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »