Логотип exploitDog
bind:CVE-2013-3612
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-3612

Количество 2

Количество 2

nvd логотип

CVE-2013-3612

больше 12 лет назад

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

CVSS2: 10
EPSS: Низкий
github логотип

GHSA-3c7g-8x9w-wjqp

больше 3 лет назад

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-3612

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

CVSS2: 10
9%
Низкий
больше 12 лет назад
github логотип
GHSA-3c7g-8x9w-wjqp

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

9%
Низкий
больше 3 лет назад

Уязвимостей на страницу