Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
daniele linguaglossa vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2015-4027
The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) prior to 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.
Acunetix Web Vulnerability Scanner
1 EDB exploit
755
VMScore
CVE-2014-7226
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and previous versions allows remote malicious users to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols.
Rejetto Http File Server
1 EDB exploit
NA
CVE-2023-46453
GliNet with firmware version 4.x suffers from an authentication bypass vulnerability. Other firmware versions may also be affected.
1 Github repository
905
VMScore
CVE-2017-12763
An unspecified server utility in NoMachine prior to 5.3.10 on Mac OS X and Linux allows authenticated users to gain privileges by gaining access to local files.
Nomachine Nomachine
1 EDB exploit
505
VMScore
CVE-2018-5319
RAVPower FileHub 2.000.056 allows remote users to steal sensitive information via a crafted HTTP request.
Ravpower Filehub Firmware 2.000.056
1 EDB exploit
NA
CVE-2023-30350
FS S3900-24T4S devices allow authenticated attackers with guest access to escalate their privileges and reset the admin password.
Fs S3900 24t4s Firmware -
1000
VMScore
CVE-2018-5997
An issue exists in the HTTP Server in RAVPower Filehub 2.000.056. Due to an unrestricted upload feature and a path traversal vulnerability, it is possible to upload a file on a filesystem with root privileges: this will lead to remote code execution as root.
Ravpower Filehub Firmware 2.000.056
1 EDB exploit
1000
VMScore
CVE-2018-5724
MASTER IPCAMERA01 3.3.4.2103 devices allow Unauthenticated Configuration Download and Upload, as demonstrated by restore.cgi.
Barni Master Ip Camera01 Firmware 3.3.4.2103
1 EDB exploit
1000
VMScore
CVE-2018-5723
MASTER IPCAMERA01 3.3.4.2103 devices have a hardcoded password of cat1029 for the root account.
Barni Master Ip Camera01 Firmware 3.3.4.2103
1 EDB exploit
505
VMScore
CVE-2018-5725
MASTER IPCAMERA01 3.3.4.2103 devices allow Unauthenticated Configuration Change, as demonstrated by the port number of the web server.
Barni Master Ip Camera01 Firmware 3.3.4.2103
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »