Page 2 of 14 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — PowerChute plus 5.0.2 creates a "Pwrchute" directory during installation that is shared and world writeable, which could allow remote attackers to modify or create files in that directory. • http://online.securityfocus.com/archive/1/277930 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

22 Aug 2001 — APC Web/SNMP Management Card prior to Firmware 310 only supports one telnet connection, which allows a remote attacker to create a denial of service via repeated failed logon attempts which temporarily locks the card. • https://www.exploit-db.com/exploits/20654 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 2

16 Feb 2001 — APC UPS daemon, apcupsd, saves its process ID in a world-writable file, which allows local users to kill an arbitrary process by specifying the target process ID in the apcupsd.pid file. • https://www.exploit-db.com/exploits/251 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2000 — The HTTP service in American Power Conversion (APC) PowerChute uses a default username and password, which allows remote attackers to gain system access. • http://governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php •