Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
evisitorpass vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2018-17497
eVisitorPass contains default administrative credentials. An attacker could exploit this vulnerability to gain full access to the application.
Thresholdsecurity Evisitorpass 1.5.5.2
7.2
CVSSv2
CVE-2018-17493
eVisitorPass could allow a local malicious user to gain elevated privileges on the system, caused by an error with the Fullscreen button. By visiting the kiosk and clicking the full screen button in the bottom right, an attacker could exploit this vulnerability to close the progr...
Thresholdsecurity Evisitorpass 1.5.5.2
7.2
CVSSv2
CVE-2018-17494
eVisitorPass could allow a local malicious user to gain elevated privileges on the system, caused by an error with the Virtual Keyboard Start Menu. By visiting the kiosk and pressing windows key twice, an attacker could exploit this vulnerability to close the program and launch o...
Thresholdsecurity Evisitorpass 1.5.5.2
7.2
CVSSv2
CVE-2018-17495
eVisitorPass could allow a local malicious user to gain elevated privileges on the system, caused by an error with the Virtual Keyboard Help Dialog. By visiting the kiosk and removing the program from fullscreen, an attacker could exploit this vulnerability using the terminal to ...
Thresholdsecurity Evisitorpass 1.5.5.2
7.2
CVSSv2
CVE-2018-17496
eVisitorPass could allow a local malicious user to gain elevated privileges on the system, caused by an error while in kiosk mode. By visiting the kiosk and typing ctrl+shift+esc, an attacker could exploit this vulnerability to open the task manager to kill the process or launch ...
Thresholdsecurity Evisitorpass 1.5.5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started