Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dmc vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-18184
Crestron DMC-STRO 1.0 devices allow remote command execution as root via shell metacharacters to the ping function.
Crestron Dmc-stro Firmware 1.0
8.8
CVSSv3
CVE-2016-8384
An exploitable heap corruption vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter.
Marklogic Marklogic 8.0-5.5
6.5
CVSSv3
CVE-2017-9645
An Inadequate Encryption Strength issue exists in Mirion Technologies DMC 3000 Transmitter Module, iPam Transmitter f/DMC 2000, RDS-31 iTX and variants (including RSD31-AM Package), DRM-1/2 and variants (including Solar PWR Package), DRM and RDS Based Boundary Monitors, External ...
Mirion Dmc 3000 Transmitter Firmware -
Mirion Ipam Transmitter F\\/dmc 2000 Firmware -
Mirion Rds-31 Itx Firmware -
Mirion Drm-1\\/2 Firmware -
Mirion Drm-2 Firmware -
Mirion Rds-31 Firmware -
Mirion Telepole 2 Firmware -
Mirion Wrm2 Firmware -
5
CVSSv3
CVE-2017-9649
A Use of Hard-Coded Cryptographic Key issue exists in Mirion Technologies DMC 3000 Transmitter Module, iPam Transmitter f/DMC 2000, RDS-31 iTX and variants (including RSD31-AM Package), DRM-1/2 and variants (including Solar PWR Package), DRM and RDS Based Boundary Monitors, Exter...
Mirion Technologies Dmc 3000 Firmware -
Mirion Technologies Ipam Transmitter F\\/dmc 2000 Firmware -
Mirion Technologies Telepole Ii Firmware -
Mirion Technologies Rds-31 Itx Firmware -
Mirion Technologies Rsd31-am Firmware -
Mirion Technologies Wrm2 Mesh Repeater Firmware -
Mirion Technologies Drm-1\\/2 Firmware -
7.8
CVSSv3
CVE-2017-2797
An exploitable heap overflow vulnerability exists in the ParseEnvironment functionality of AntennaHouse DMC HTMLFilter as used by MarkLogic 8.0-6.
Marklogic Marklogic 8.0-6
8.8
CVSSv3
CVE-2016-8382
An exploitable heap corruption vulnerability exists in the Doc_SetSummary functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send a malicious doc file to trigger this vulner...
Marklogic Marklogic 8.0-5.5
8.8
CVSSv3
CVE-2016-8383
An exploitable heap corruption vulnerability exists in the Doc_GetFontTable functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious doc file to trigger thi...
Marklogic Marklogic 8.0-5.5
9.6
CVSSv3
CVE-2017-2792
An exploitable heap corruption vulnerability exists in the iBldDirInfo functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can provide a malicious xls fi...
Marklogic Marklogic 8.0-6
7.8
CVSSv3
CVE-2017-2793
An exploitable heap corruption vulnerability exists in the UnCompressUnicode functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicio...
Marklogic Marklogic 8.0-6
1 Github repository
7.8
CVSSv3
CVE-2017-2783
An exploitable heap corruption vulnerability exists in the FillRowFormat functionality of Antenna House DMC HTMLFilter that is shipped with MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provid...
Marklogic Marklogic 8.0-6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »