Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
atcom vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2010-4966
Cross-site scripting (XSS) vulnerability in default.asp in ATCOM Netvolution allows remote malicious users to inject arbitrary web script or HTML via the query parameter in a Search action.
Atcom Netvolution -
755
VMScore
CVE-2009-5102
SQL injection vulnerability in default.asp in ATCOM Netvolution 1.0 ASP allows remote malicious users to execute arbitrary SQL commands via the bpe_nid parameter.
Atcom Netvolution 1.0
1 EDB exploit
435
VMScore
CVE-2009-5103
Cross-site scripting (XSS) vulnerability in ATCOM Netvolution 1.0 ASP allows remote malicious users to inject arbitrary web script or HTML via the email variable.
Atcom Netvolution 1.0
1 EDB exploit
755
VMScore
CVE-2011-3340
SQL injection vulnerability in ATCOM Netvolution 2.5.8 ASP allows remote malicious users to execute arbitrary SQL commands via the Referer HTTP header.
Atcom Netvolution 2.5.6
1 EDB exploit
755
VMScore
CVE-2010-4967
SQL injection vulnerability in default.asp in ATCOM Netvolution 2.5.6 allows remote malicious users to execute arbitrary SQL commands via the artID parameter.
Atcom Netvolution 2.5.6
1 EDB exploit
668
VMScore
CVE-2014-2318
SQL injection vulnerability in ATCOM Netvolution 3 allows remote malicious users to execute arbitrary SQL commands via the m parameter.
Atcom Netvolution 3.0
801
VMScore
CVE-2019-12328
A command injection (missing input validation) issue in the remote phonebook configuration URI in the web interface of the Atcom A10W VoIP phone with firmware 2.6.1a2421 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in...
Atcom A10w Firmware 2.6.1a2421
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started