Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hardcoded vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-28331
Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initializati...
Barco Wepresent Wipg-1600w Firmware 2.5.1.8
9.8
CVSSv3
CVE-2015-6314
Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 prior to 8.0.121.0, and 8.1 prior to 8.1.131.0 allow remote malicious users to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.
Cisco Wireless Lan Controller Software 8.0 Base
Cisco Wireless Lan Controller Software 8.1.104.37
Cisco Wireless Lan Controller Software 8.1.0
Cisco Wireless Lan Controller Software 8.1.122.0
Cisco Wireless Lan Controller Software 8.1.111.0
Cisco Wireless Lan Controller Software 8.0.72.140
1 Article
6.5
CVSSv3
CVE-2015-6317
Cisco Identity Services Engine (ISE) prior to 2.0 allows remote authenticated users to bypass intended web-resource access restrictions via a direct request, aka Bug ID CSCuu45926.
Cisco Identity Services Engine Software 1.3\\(120.135\\)
Cisco Identity Services Engine Software 1.3\\(106.146\\)
Cisco Identity Services Engine Software 1.2.1
Cisco Identity Services Engine Software 1.1.4
Cisco Identity Services Engine Software 1.1.3
Cisco Identity Services Engine Software 1.1.2
Cisco Identity Services Engine Software 1.1.1
Cisco Identity Services Engine Software 1.0.4.573
Cisco Identity Services Engine Software 1.0 Mr Base
Cisco Identity Services Engine Software 1.2\\(1.198\\)
Cisco Identity Services Engine Software 1.4\\(0.109\\)
Cisco Identity Services Engine Software 1.2\\(0.793\\)
Cisco Identity Services Engine Software 1.2.0.899
Cisco Identity Services Engine Software 1.2\\(0.747\\)
Cisco Identity Services Engine Software 1.2 Base
Cisco Identity Services Engine Software 1.1 Base
Cisco Identity Services Engine Software 1.3\\(0.722\\)
Cisco Identity Services Engine Software 1.2\\(1.901\\)
Cisco Identity Services Engine Software 1.0 Base
Cisco Identity Services Engine Software 1.4\\(0.253\\)
Cisco Identity Services Engine Software 1.4\\(0.181\\)
Cisco Identity Services Engine Software 1.3\\(0.876\\)
1 Article
9.8
CVSSv3
CVE-2015-6323
The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote malicious users to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253.
Cisco Identity Services Engine Software 1.1.4
Cisco Identity Services Engine Software 1.1.3
Cisco Identity Services Engine Software 1.1.2
Cisco Identity Services Engine Software 1.1.1
Cisco Identity Services Engine Software 1.3\\(106.146\\)
Cisco Identity Services Engine Software 1.3\\(0.722\\)
Cisco Identity Services Engine Software 1.2.1
Cisco Identity Services Engine Software 1.2\\(0.793\\)
Cisco Identity Services Engine Software 1.3\\(120.135\\)
Cisco Identity Services Engine Software 1.2\\(0.747\\)
Cisco Identity Services Engine Software 1.2\\(1.198\\)
Cisco Identity Services Engine Software 1.4\\(0.109\\)
Cisco Identity Services Engine Software 1.3\\(0.876\\)
Cisco Identity Services Engine Software 1.2.0.899
Cisco Identity Services Engine Software 1.2 Base
Cisco Identity Services Engine Software 1.1 Base
Cisco Identity Services Engine Software 1.4\\(0.253\\)
Cisco Identity Services Engine Software 1.2\\(1.901\\)
Cisco Identity Services Engine Software 1.4\\(0.181\\)
1 Article
8.8
CVSSv3
CVE-2017-12929
Arbitrary File Upload in resource.php of TecnoVISION DLX Spot Player4 version >1.5.10 allows remote authenticated users to upload arbitrary files leading to Remote Command Execution.
Tecnovision Dlx Spot Player4 -
2 EDB exploits
1 Github repository
9.8
CVSSv3
CVE-2019-16399
Western Digital WD My Book World through II 1.02.12 suffers from Broken Authentication, which allows an malicious user to access the /admin/ directory without credentials. An attacker can easily enable SSH from /admin/system_advanced.php?lang=en and login with the default root pa...
Westerndigital Wd My Book Firmware
1 EDB exploit
9.8
CVSSv3
CVE-2020-12110
Certain TP-Link devices have a Hardcoded Encryption Key. This affects NC200 2.1.9 build 200225, N210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.
Tp-link Nc200 Firmware 2.1.6
Tp-link Nc200 Firmware 2.1.9
Tp-link Nc210 Firmware 1.0.3
Tp-link Nc210 Firmware 1.0.4
Tp-link Nc210 Firmware 1.0.9
Tp-link Nc220 Firmware 1.2.0
Tp-link Nc220 Firmware 1.3.0
Tp-link Nc230 Firmware 1.0.3
Tp-link Nc230 Firmware 1.2.1
Tp-link Nc230 Firmware 1.3.0
Tp-link Nc250 Firmware 1.0.8
Tp-link Nc250 Firmware 1.0.10
Tp-link Nc250 Firmware 1.2.1
Tp-link Nc250 Firmware 1.3.0
Tp-link Nc260 Firmware 1.0.5
Tp-link Nc260 Firmware 1.0.6
Tp-link Nc260 Firmware 1.4.1
Tp-link Nc260 Firmware 1.5.0
Tp-link Nc260 Firmware 1.5.2
Tp-link Nc450 Firmware 1.0.15
Tp-link Nc450 Firmware 1.1.2
Tp-link Nc450 Firmware 1.3.4
1 Metasploit module
6.5
CVSSv3
CVE-2021-39243
Cross-Site Request Forgery (CSRF) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via any CGI endpoint. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1...
Altus Nexto Nx3003 Firmware 1.8.11.0
Altus Nexto Nx3004 Firmware 1.8.11.0
Altus Nexto Nx3005 Firmware 1.8.11.0
Altus Nexto Nx3010 Firmware 1.8.3.0
Altus Nexto Nx3020 Firmware 1.8.3.0
Altus Nexto Nx3030 Firmware 1.8.3.0
Altus Nexto Nx5100 Firmware 1.8.11.0
Altus Nexto Nx5101 Firmware 1.8.11.0
Altus Nexto Nx5110 Firmware 1.1.2.8
Altus Nexto Nx5210 Firmware 1.1.2.8
Altus Nexto Xpress Xp300 Firmware 1.8.11.0
Altus Nexto Xpress Xp315 Firmware 1.8.11.0
Altus Nexto Xpress Xp325 Firmware 1.8.11.0
Altus Nexto Xpress Xp340 Firmware 1.8.11.0
Altus Hadron Xtorm Hx3040 Firmware 1.7.58.0
8.8
CVSSv3
CVE-2021-39244
Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX...
Altus Nexto Nx3003 Firmware 1.8.11.0
Altus Nexto Nx3004 Firmware 1.8.11.0
Altus Nexto Nx3005 Firmware 1.8.11.0
Altus Nexto Nx3010 Firmware 1.8.3.0
Altus Nexto Nx3020 Firmware 1.8.3.0
Altus Nexto Nx3030 Firmware 1.8.3.0
Altus Nexto Nx5100 Firmware 1.8.11.0
Altus Nexto Nx5101 Firmware 1.8.11.0
Altus Nexto Nx5110 Firmware 1.1.2.8
Altus Nexto Nx5210 Firmware 1.1.2.8
Altus Nexto Xpress Xp300 Firmware 1.8.11.0
Altus Nexto Xpress Xp315 Firmware 1.8.11.0
Altus Nexto Xpress Xp325 Firmware 1.8.11.0
Altus Nexto Xpress Xp340 Firmware 1.8.11.0
Altus Hadron Xtorm Hx3040 Firmware 1.7.58.0
7.5
CVSSv3
CVE-2021-39245
Hardcoded .htaccess Credentials for getlogs.cgi exist on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0,...
Altus Nexto Nx3003 Firmware 1.8.11.0
Altus Nexto Nx3004 Firmware 1.8.11.0
Altus Nexto Nx3005 Firmware 1.8.11.0
Altus Nexto Nx3010 Firmware 1.8.3.0
Altus Nexto Nx3020 Firmware 1.8.3.0
Altus Nexto Nx3030 Firmware 1.8.3.0
Altus Nexto Nx5100 Firmware 1.8.11.0
Altus Nexto Nx5101 Firmware 1.8.11.0
Altus Nexto Nx5110 Firmware 1.1.2.8
Altus Nexto Nx5210 Firmware 1.1.2.8
Altus Nexto Xpress Xp300 Firmware 1.8.11.0
Altus Nexto Xpress Xp315 Firmware 1.8.11.0
Altus Nexto Xpress Xp325 Firmware 1.8.11.0
Altus Nexto Xpress Xp340 Firmware 1.8.11.0
Altus Hadron Xtorm Hx3040 Firmware 1.7.58.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »