Lucene search

K
Digital Alert SystemsDasdec Eas

5 matches found

CVE
CVE
added 2013/06/30 7:28 p.m.68 views

CVE-2013-0137

The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.

10CVSS9.1AI score0.62938EPSS
CVE
CVE
added 2013/06/30 7:28 p.m.43 views

CVE-2013-4735

The Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 have a default password for an administrative account, which makes it easier for remote attackers to obtain access via an IP network.

10CVSS7AI score0.08371EPSS
CVE
CVE
added 2013/06/30 7:28 p.m.39 views

CVE-2013-4734

dasdec_mkuser on the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 generates predictable passwords, which might make it easier for attackers to obtain non-administrative access via unspecified vectors.

7.5CVSS6.7AI score0.00968EPSS
CVE
CVE
added 2013/06/30 7:28 p.m.38 views

CVE-2013-4732

The administrative web server on the Digital Alert Systems DASDEC EAS device through 2.0-2 and the Monroe Electronics R189 One-Net EAS device through 2.0-2 uses predictable session ID values, which makes it easier for remote attackers to hijack sessions by sniffing the network. NOTE: VU#662676 stat...

10CVSS6.9AI score0.01199EPSS
CVE
CVE
added 2013/06/30 7:28 p.m.29 views

CVE-2013-4733

The web server on the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 allows remote attackers to obtain sensitive configuration and status information by reading log files.

7.8CVSS6.4AI score0.00638EPSS