2 results (0.005 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 1

08 Jan 2018 — Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html. Los dispositivos Cobham Sea Tel 121 build 222701 permiten que los atacantes remotos omitan la autenticación mediante una petición directa a MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html o MenuSys.html. • http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 1

08 Jan 2018 — Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1. Los dispositivos Cobham Sea Tel 121 build 222701 permiten que los atacantes remotos obtengan información potencialmente sensible sobre n... • http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •