Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
federick joe p fajardo vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-4733
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote malicious users to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packe...
Aztech Dsl 600eu Router
10
CVSSv2
CVE-2008-6554
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote malicious users to execute arbitrary commands via shell metacharacters in the query string.
Aztech Adsl2\\/2\\+4-port Router 3.7.0
7.5
CVSSv2
CVE-2015-4464
Kguard Digital Video Recorder 104, 108, v2 does not have any authorization or authentication between an ActiveX client and the application server.
Kguardsecurity Kg-sha104 Firmware 2.0
Kguardsecurity Kg-sha108 Firmware 2.0
5
CVSSv2
CVE-2014-6435
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote malicious users to cause a denial of service (WAN connectivity reset) via a direct request.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
10
CVSSv2
CVE-2008-6588
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote malicious users to obtain access if this default is not changed.
Aztech Adsl2\\/2\\+4-port Router -
5
CVSSv2
CVE-1999-0077
Predictable TCP sequence numbers allow spoofing.
Microsoft Windows Nt 4.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started