# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
43001 |
CVE-2015-7288 |
254 |
|
|
2015-11-24 |
2015-11-25 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 allow remote attackers to modify the configuration via a command in an SMS message, as demonstrated by a "4 2" command. |
43002 |
CVE-2015-7287 |
255 |
|
Exec Code |
2015-11-24 |
2015-11-25 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 use the same 001984 default PIN across different customers' installations, which allows remote attackers to execute commands by leveraging knowledge of this PIN and including it in an SMS message. |
43003 |
CVE-2015-7286 |
310 |
|
|
2015-11-24 |
2015-11-27 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol traffic. |
43004 |
CVE-2015-7285 |
287 |
|
Bypass |
2015-11-24 |
2015-11-25 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 do not require authentication from Alarm Receiving Center (ARC) servers, which allows man-in-the-middle attackers to bypass intended access restrictions via a spoofed HSxx response. |
43005 |
CVE-2015-7284 |
352 |
|
CSRF |
2015-12-31 |
2016-12-07 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users. |
43006 |
CVE-2015-7283 |
255 |
|
|
2015-12-31 |
2016-12-07 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. |
43007 |
CVE-2015-7282 |
20 |
|
|
2015-12-31 |
2016-11-28 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port. |
43008 |
CVE-2015-7281 |
352 |
|
CSRF |
2015-12-31 |
2016-11-28 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Cross-site request forgery (CSRF) vulnerability on ReadyNet WRT300N-DD devices with firmware 1.0.26 allows remote attackers to hijack the authentication of arbitrary users. |
43009 |
CVE-2015-7280 |
255 |
|
|
2015-12-31 |
2016-11-28 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. |
43010 |
CVE-2015-7279 |
|
|
|
2015-12-31 |
2016-11-28 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Amped Wireless R10000 devices with firmware 2.5.2.11 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. |
43011 |
CVE-2015-7278 |
352 |
|
CSRF |
2015-12-31 |
2016-11-28 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Cross-site request forgery (CSRF) vulnerability on Amped Wireless R10000 devices with firmware 2.5.2.11 allows remote attackers to hijack the authentication of arbitrary users. |
43012 |
CVE-2015-7277 |
255 |
|
|
2015-12-31 |
2016-11-28 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. |
43013 |
CVE-2015-7275 |
79 |
|
XSS |
2017-04-09 |
2017-04-14 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Dell Integrated Remote Access Controller (iDRAC) 6 before 2.85 and 7/8 before 2.30.30.30 has XSS. |
43014 |
CVE-2015-7274 |
264 |
|
Exec Code |
2017-04-09 |
2017-04-14 |
6.5 |
None |
Remote |
Low |
Single system |
Partial |
Partial |
Partial |
Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 allows remote attackers to execute arbitrary administrative HTTP commands. |
43015 |
CVE-2015-7273 |
611 |
|
|
2017-04-09 |
2017-04-14 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has XXE. |
43016 |
CVE-2015-7272 |
119 |
|
DoS Overflow |
2017-04-09 |
2017-04-14 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 and 7/8 before 2.21.21.21 allows attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long SSH username or input. |
43017 |
CVE-2015-7271 |
134 |
|
|
2017-04-09 |
2017-04-14 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has a format string issue in racadm getsystinfo. |
43018 |
CVE-2015-7270 |
22 |
|
Dir. Trav. |
2017-04-09 |
2017-04-14 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 and 7/8 before 2.21.21.21 allows directory traversal. |
43019 |
CVE-2015-7265 |
284 |
|
Bypass |
2017-04-09 |
2018-08-13 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Facebook Proxygen before 2015-11-09 mismanages HTTPMessage.request state, which allows remote attackers to conduct hijacking attacks and bypass ACL checks. |
43020 |
CVE-2015-7264 |
74 |
|
|
2017-04-09 |
2018-08-13 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The SPDY/2 codec in Facebook Proxygen before 2015-11-09 truncates a certain field to two bytes, which allows hijacking and injection attacks. |
43021 |
CVE-2015-7263 |
284 |
|
Bypass |
2017-04-09 |
2018-08-13 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The SPDY/2 codec in Facebook Proxygen before 2015-11-09 allows remote attackers to conduct hijacking attacks and bypass ACL checks via a crafted host value. |
43022 |
CVE-2015-7262 |
18 |
|
+Priv |
2016-02-27 |
2016-03-11 |
8.5 |
None |
Remote |
Medium |
Single system |
Complete |
Complete |
Complete |
QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, allows remote authenticated users to gain privileges by registering an executable file, and then waiting for this file to be run in a privileged context after a reboot. |
43023 |
CVE-2015-7261 |
255 |
|
|
2016-02-27 |
2016-03-11 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The FTP service in QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, has hardcoded credentials, which makes it easier for remote attackers to obtain access via a session on TCP port 21. |
43024 |
CVE-2015-7260 |
264 |
|
+Priv |
2017-04-09 |
2017-04-13 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Liebert MultiLink Automated Shutdown v4.2.4 allows local users to gain privileges by replacing the LiebertM executable file. |
43025 |
CVE-2015-7259 |
255 |
|
|
2017-08-24 |
2017-08-29 |
9.0 |
None |
Remote |
Low |
Single system |
Complete |
Complete |
Complete |
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs. |
43026 |
CVE-2015-7258 |
255 |
|
+Info |
2017-08-24 |
2017-08-30 |
9.0 |
None |
Remote |
Low |
Single system |
Complete |
Complete |
Complete |
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection. |
43027 |
CVE-2015-7257 |
640 |
|
|
2017-08-24 |
2017-08-29 |
8.5 |
None |
Remote |
Medium |
Single system |
Complete |
Complete |
Complete |
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from "support" to "admin". |
43028 |
CVE-2015-7256 |
310 |
|
|
2017-09-27 |
2017-10-11 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. |
43029 |
CVE-2015-7255 |
200 |
|
+Info |
2017-08-29 |
2017-09-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. |
43030 |
CVE-2015-7254 |
22 |
|
Dir. Trav. |
2015-11-06 |
2018-12-15 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Directory traversal vulnerability on Huawei HG532e, HG532n, and HG532s devices allows remote attackers to read arbitrary files via a .. (dot dot) in an icon/ URI. |
43031 |
CVE-2015-7253 |
78 |
|
Exec Code |
2015-11-03 |
2015-11-04 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
The Web Console in Commvault Edge Server 10 R2 allows remote attackers to execute arbitrary OS commands via crafted serialized data in a cookie. |
43032 |
CVE-2015-7252 |
79 |
|
XSS |
2015-12-30 |
2017-09-12 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Cross-site scripting (XSS) vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allows remote attackers to inject arbitrary web script or HTML via the errorpage parameter. |
43033 |
CVE-2015-7251 |
255 |
|
|
2015-12-30 |
2017-09-12 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE have a hardcoded password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session. |
43034 |
CVE-2015-7250 |
22 |
|
Dir. Trav. |
2015-12-30 |
2017-09-12 |
7.8 |
None |
Remote |
Low |
Not required |
Complete |
None |
None |
Absolute path traversal vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. |
43035 |
CVE-2015-7249 |
264 |
|
Bypass |
2015-12-30 |
2017-09-12 |
6.8 |
None |
Remote |
Low |
Single system |
None |
Complete |
None |
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action. |
43036 |
CVE-2015-7248 |
200 |
|
+Info |
2015-12-30 |
2017-09-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote attackers to discover usernames and password hashes by reading the cgi-bin/webproc HTML source code, a different vulnerability than CVE-2015-8703. |
43037 |
CVE-2015-7247 |
200 |
|
+Info |
2017-04-24 |
2017-04-28 |
7.8 |
None |
Remote |
Low |
Not required |
Complete |
None |
None |
D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 discloses usernames, passwords, keys, values, and web account hashes (super and admin) in plaintext when running a configuration backup, which allows remote attackers to obtain sensitive information. |
43038 |
CVE-2015-7246 |
798 |
|
|
2017-04-24 |
2017-04-28 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 has a default password of root for the root account and tw for the tw account, which makes it easier for remote attackers to obtain administrative access. |
43039 |
CVE-2015-7245 |
22 |
|
Dir. Trav. |
2017-04-24 |
2017-04-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter. |
43040 |
CVE-2015-7244 |
284 |
|
Exec Code +Info |
2015-11-03 |
2015-11-04 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The default configuration of the server in MobaXterm before 8.3 has a disabled Access Control setting and consequently does not require authentication for X11 connections, which allows remote attackers to execute arbitrary commands or obtain sensitive information via X11 packets. |
43041 |
CVE-2015-7243 |
119 |
|
DoS Exec Code Overflow |
2015-09-18 |
2018-07-05 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Buffer overflow in Boxoft WAV to MP3 Converter allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted WAV file. |
43042 |
CVE-2015-7242 |
79 |
|
XSS |
2016-01-12 |
2018-10-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Cross-site scripting (XSS) vulnerability in the Push-Service-Mails feature in AVM FRITZ!OS before 6.30 allows remote attackers to inject arbitrary web script or HTML via the display name in the FROM field of an SIP INVITE message. |
43043 |
CVE-2015-7241 |
611 |
|
|
2017-09-06 |
2018-10-09 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
XML External Entity (XXE) vulnerability in SAP Netweaver before 7.01. |
43044 |
CVE-2015-7239 |
89 |
|
Exec Code Sql |
2015-09-18 |
2018-12-10 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
SQL injection vulnerability in the BP_FIND_JOBS_WITH_PROGRAM function module in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. |
43045 |
CVE-2015-7237 |
22 |
|
Dir. Trav. +Info |
2015-09-18 |
2015-09-22 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Directory traversal vulnerability in the remote log viewing functionality in McAfee Agent (MA) 5.x before 5.0.2 allows remote attackers to obtain sensitive information via unspecified vectors. |
43046 |
CVE-2015-7236 |
|
|
DoS |
2015-10-01 |
2017-06-30 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code. |
43047 |
CVE-2015-7235 |
89 |
|
Exec Code Sql |
2015-09-17 |
2016-12-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Multiple SQL injection vulnerabilities in dex_reservations.php in the CP Reservation Calendar plugin before 1.1.7 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a dex_reservations_calendar_load2 action or (2) dex_item parameter in a dex_reservations_check_posted_data action in a request to the default URI. |
43048 |
CVE-2015-7234 |
20 |
|
|
2015-09-17 |
2015-09-23 |
4.0 |
None |
Remote |
High |
Not required |
None |
Partial |
Partial |
The OSF module 7.x-3.x before 7.x-3.1 for Drupal, when the OSF Ontology and OSF Import modules are enabled, allows user-assisted remote attackers to delete arbitrary files via unspecified vectors. |
43049 |
CVE-2015-7233 |
352 |
|
CSRF |
2015-09-17 |
2015-09-18 |
5.1 |
None |
Remote |
High |
Not required |
Partial |
Partial |
Partial |
Cross-site request forgery (CSRF) vulnerability in the OSF module 7.x-3.x before 7.x-3.1 for Drupal, when the OSF Import module is enabled, allows remote attackers to hijack the authentication of administrators for requests that create new OSF datasets via unspecified vectors. |
43050 |
CVE-2015-7231 |
20 |
|
|
2015-09-17 |
2015-09-21 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The Commerce Commonwealth (CBA) module 7.x-1.x before 7.x-1.5 for Drupal does not properly validate payments, which allows remote attackers to make a failed payment appear valid via a crafted URL, related to a "response from commweb." |