Download
| Alert*
oval:org.secpod.oval:def:6332
The host is installed with WellinTech KingView 6.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP port 555. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:6331 The host is installed with WellinTech KingView 6.53 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP port 555. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:6330 The host is installed with WellinTech KingView 6.53 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP or UDP port 2001. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:6255 The host is installed with WellinTech KingView 6.53 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted HTTP request. Successful exploitation allows remote attackers to read arbitrary files. oval:org.secpod.oval:def:7489 The host is installed with WellinTech KingView 6.5.3 (65.30.2003.17377) or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which uses a weak password-hashing algorithm. Successful exploitation allows local users to discover credentials by reading a ... |