Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
unauthorized vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2005-2729
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote malicious users to bypass firewall rules and connect to local services.
Astaro Security Linux 6.001
1 EDB exploit
NA
CVE-2022-37255
TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
Tp-link Tapo C310 Firmware 1.3.0
445
VMScore
CVE-2017-12363
A vulnerability in Cisco WebEx Meeting Server could allow an unauthenticated, remote malicious user to modify the welcome message of a meeting on an affected system. The vulnerability is due to insufficient security settings on meetings. An attacker could exploit this vulnerabili...
Cisco Webex Meetings Server 2.6.0.8
Cisco Webex Meetings Server 2.7
NA
CVE-2023-20230
A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote malicious user to read, modify, or delete non-tenant policies (for example, access policies) created by users associa...
Cisco Application Policy Infrastructure Controller
890
VMScore
CVE-2017-12337
A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote malicious user to gain unauthorized, elevated access to an affected device. The vulnerability occurs when a ...
Cisco Prime License Manager -
Cisco Unity Connection -
Cisco Emergency Responder -
Cisco Unified Communications Manager Im And Presence Service -
Cisco Unified Communications Manager -
Cisco Finesse -
Cisco Mediasense -
Cisco Socialminer -
Cisco Unified Intelligence Center -
Cisco Hosted Collaboration Solution -
Cisco Unified Contact Center Express -
645
VMScore
CVE-2003-1521
Sun Java Plug-In 1.4 up to and including 1.4.2_02 allows remote malicious users to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model.
Sun Java Plug-in 1.4
Sun Java Plug-in 1.4.2
Sun Java Plug-in 1.4.2 01
Sun Java Plug-in 1.4.2 02
1 EDB exploit
1000
VMScore
CVE-2003-1160
FlexWATCH Network video server 132 allows remote malicious users to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
Seyeon Flexwatch Network Video Server 2.2
Seyeon Flexwatch Network Video Server Model 132
1 EDB exploit
605
VMScore
CVE-2016-6377
Media Origination System Suite Software 2.6 and previous versions in Cisco Virtual Media Packager (VMP) allows remote malicious users to bypass authentication and make arbitrary Platform and Applications Manager (PAM) API calls via unspecified vectors, aka Bug ID CSCuz52110.
Cisco Media Origination System Suite 2.3 Base
Cisco Media Origination System Suite 2.3\\(7\\)
Cisco Media Origination System Suite 2.3\\(8\\)
Cisco Media Origination System Suite 2.4\\(1\\)
Cisco Media Origination System Suite 2.3\\(2\\)
Cisco Media Origination System Suite 2.3\\(6\\)
Cisco Media Origination System Suite 2.6 Base
Cisco Media Origination System Suite 2.3\\(1\\)
Cisco Media Origination System Suite 2.4 Base
Cisco Media Origination System Suite 2.5 Base
Cisco Media Origination System Suite 2.5\\(0\\)
Cisco Media Origination System Suite 2.5\\(1\\)
578
VMScore
CVE-2015-6395
Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1, and 11.0 does not properly restrict access to web pages, which allows remote malicious users to modify the configuration via a direct request, aka Bug ID CSCuw48188.
Cisco Prime Service Catalog 10.1 Base
Cisco Prime Service Catalog 10.0 Base
Cisco Prime Service Catalog 11.0 Base
Cisco Prime Service Catalog 10.0\\(r2\\) Base
445
VMScore
CVE-2016-1321
Cisco Universal Small Cell devices with firmware R2.12 through R3.5 contain an image-decryption key in flash memory, which allows remote malicious users to bypass a certain certificate-validation feature and obtain sensitive firmware-image and IP address data via a request to an ...
Cisco Universal Small Cell Firmware R3.4 Base
Cisco Universal Small Cell Firmware R3.3 Base
Cisco Universal Small Cell Firmware R2.12 Base
Cisco Universal Small Cell Firmware R3.4 2.17
Cisco Universal Small Cell Firmware R3.4 2.1
Cisco Universal Small Cell Firmware R2.16 Base
Cisco Universal Small Cell Firmware R2.15 Base
Cisco Universal Small Cell Firmware R3.4 1.1
Cisco Universal Small Cell Firmware R3.5 Base
Cisco Universal Small Cell Firmware R2.14 Base
Cisco Universal Small Cell Firmware R2.13 Base
Cisco Universal Small Cell Firmware R3.2 Base
Cisco Universal Small Cell Firmware R2.17 Base
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »