CVSS Base Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Detection Type: exploit
Solution Type: None Available
Summary: AVCON6 Systems Management Platform is prone to a remote code execution
Impact: An unauthenticated attacker may execute arbitrary code on the system.
Detection Method: Sends a crafted HTTP GET request and checks the response.
Recommendations: No known solution is available as of 23rd September, 2019.
Information regarding this issue will be updated once solution details are available.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Foxit Studio Photo Version Detection (Windows)
Debian LTS Advisory ([SECURITY] [DLA 1955-1] tcpdump security update)
Debian LTS Advisory ([SECURITY] [DLA 1956-1] ruby-openid security update)
Fedora Update for SDL2 FEDORA-2019-8ef33a69ca
Fedora Update for krb5 FEDORA-2019-dc4e1d0fb6
openSUSE Update for the openSUSE-SU-2019:2307-1 (the)
Ubuntu Update for octavia USN-4153-1
Debian LTS Advisory ([SECURITY] [DLA 1954-1] lucene-solr security update)
Debian LTS Advisory ([SECURITY] [DLA 1953-1] clamav security update)
Microsoft Windows Multiple Vulnerabilities (KB4519338)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.