• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

weak

  1. 1

    Exploits Tomedo Server 1.7.3 Information Disclosure / Weak Cryptography

    Tomedo Server version 1.7.3 suffers from using weak cryptography for passwords and cleartext transmission of sensitive information vulnerabilities. View the full article
  2. 1

    Exploits Shekar Endoscope Weak Default Settings / Memory Corruption

    Shekar Endoscope has telnet enabled by default, default wifi credentials, a flaw where an attacker can change the wifi password without any additional authentication, and four memory corruption vulnerabilities. View the full article
  3. 1

    Exploits Cisco VoIP Script Insertion / Weak Passwords / Undocumented Functionality

    Cisco VoIP phone such as models 88XX suffer from script insertion, weak and hard-coded passwords, undocumented debug functionality, and various outdated components with known vulnerabilities. View the full article
Back
Top