Vulnerabilities > Hidden Functionality
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-29 | CVE-2023-4467 | Hidden Functionality vulnerability in Poly Trio 8800 Firmware 7.2.6.0019 A vulnerability was found in Poly Trio 8800 7.2.6.0019 and classified as critical. | 6.6 |
2023-12-08 | CVE-2023-6614 | Hidden Functionality vulnerability in Typecho 1.2.1 A vulnerability classified as problematic was found in Typecho 1.2.1. | 2.7 |
2023-02-16 | CVE-2022-3843 | Hidden Functionality vulnerability in Wago 852-111/000-001 Firmware 01 In WAGO Unmanaged Switch (852-111/000-001) in firmware version 01 an undocumented configuration interface without authorization allows an remote attacker to read system information and configure a limited set of parameters. | 9.1 |
2022-10-21 | CVE-2022-3203 | Hidden Functionality vulnerability in Oringnet Iap-420+ Firmware and Iap-420 Firmware On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. | 9.8 |
2022-02-21 | CVE-2021-24867 | Hidden Functionality vulnerability in Accesspressthemes products Numerous Plugins and Themes from the AccessPress Themes (aka Access Keys) vendor are backdoored due to their website being compromised. | 7.5 |
2021-12-23 | CVE-2021-43987 | Hidden Functionality vulnerability in Myscada Mypro 7/7.0.26 An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface. | 7.5 |
2020-10-15 | CVE-2020-12504 | Hidden Functionality vulnerability in multiple products Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below has an active TFTP-Service. | 7.5 |
2020-09-01 | CVE-2020-16204 | Hidden Functionality vulnerability in Redlion N-Tron 702-W Firmware and N-Tron 702M12-W Firmware The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions). | 9.8 |