Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
superuser vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2022-1668
Weak default root user credentials allow remote malicious users to easily obtain OS superuser privileges over the open TCP port for SSH.
Secheron Sepcos Control And Protection Relay Firmware
10
CVSSv2
CVE-2021-37555
TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem throug...
Trixie Tx9 Automatic Food Dispenser Firmware 3.2.57
10
CVSSv2
CVE-2020-9409
The administrative UI component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server for AWS Marketplace, and TIBCO JasperReports Server for ActiveMatrix BPM contains a vulnerability that theoretically allows an unauthenticated malicious user to ob...
Tibco Jasperreports Server
Oracle Retail Order Broker 15.0
Oracle Retail Order Broker 16.0
10
CVSSv2
CVE-2019-11526
An issue exists in Softing uaGate SI 1.60.01. A maintenance script, that is executable via sudo, is vulnerable to file path injection. This enables the malicious user to write files with superuser privileges in specific locations.
Softing Uagate Si Firmware 1.60.01
10
CVSSv2
CVE-2018-1822
IBM FlashSystem 900 product GUI allows a specially crafted attack to bypass the authentication requirements of the system, resulting in the ability to remotely change the superuser password. This can be used by an malicious user to gain administrative control or to deny service. ...
Ibm Flashsystem 900 Firmware 1.4
Ibm Flashsystem 840 Firmware 1.4
10
CVSSv2
CVE-2018-0035
QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Enviro...
Juniper Junos 15.1x53
10
CVSSv2
CVE-2013-6769
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android allows malicious users to gain privileges via shell metacharacters in the -c option to /system/xbin/su.
Koushik Dutta Superuser 1.0.2.1
10
CVSSv2
CVE-2013-6775
The Chainfire SuperSU package prior to 1.69 for Android allows malicious users to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.
Chainfire Supersu 1.69
10
CVSSv2
CVE-2013-6774
Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and previous versions, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and previous versions, and Chainfire SuperSU package prior to 1.69 for Android 4.2.x and...
Chainfire Supersu 1.69
Androidsu Chainsdd Superuser 3.1.3
Koushik Dutta Superuser 1.0.2.1
10
CVSSv2
CVE-2013-1903
PostgreSQL, possibly 9.2.x prior to 9.2.4, 9.1.x prior to 9.1.9, 9.0.x prior to 9.0.13, 8.4.x prior to 8.4.17, and 8.3.x prior to 8.3.23 incorrectly provides the superuser password to scripts related to "graphical installers for Linux and Mac OS X," which has unspecifie...
Postgresql Postgresql 9.2.3
Postgresql Postgresql 9.2.2
Postgresql Postgresql 9.2.1
Postgresql Postgresql 9.2
Postgresql Postgresql 9.1.3
Postgresql Postgresql 9.1.6
Postgresql Postgresql 9.1.7
Postgresql Postgresql 9.1.4
Postgresql Postgresql 9.1.1
Postgresql Postgresql 9.1.5
Postgresql Postgresql 9.1
Postgresql Postgresql 9.1.8
Postgresql Postgresql 9.1.2
Postgresql Postgresql 9.0.12
Postgresql Postgresql 9.0
Postgresql Postgresql 9.0.5
Postgresql Postgresql 9.0.3
Postgresql Postgresql 9.0.6
Postgresql Postgresql 9.0.4
Postgresql Postgresql 9.0.1
Postgresql Postgresql 9.0.2
Postgresql Postgresql 9.0.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »