Product Detail
CONFIGURATOR
Public Exploit/PoC Code :
1
CISA Actively Exploited :
0
Last Vulnerability Seen :
Apr. 15, 2025
Vulnerabilities
The following vulnerabilities are recorded
CONFIGURATOR
product. You can click on the
vulnerability to view more details.
Number | Published | CVE ID | Severity | CVSS Score | |
---|---|---|---|---|---|
1 | Apr 15, 2025 | CVE-2025-30728 | HIGH |
7.5
|
|
2 | Apr 15, 2025 | CVE-2025-30720 | MEDIUM |
6.1
|
|
3 | Jan 19, 2022 | CVE-2022-21255 | HIGH |
8.1
|
|
4 | Jan 20, 2021 | CVE-2021-2080 | HIGH |
8.2
|
|
5 | Jan 20, 2021 | CVE-2021-2079 | HIGH |
8.2
|
|
6 | Jan 20, 2021 | CVE-2021-2078 | HIGH |
8.2
|
|
7 | Jul 15, 2020 | CVE-2020-14669 | HIGH |
8.2
|
|
8 | Apr 15, 2020 | CVE-2020-2865 | MEDIUM |
5.3
|
|
9 | Apr 23, 2019 | CVE-2019-2567 | HIGH |
7.5
|
|
10 | Apr 21, 2016 | CVE-2016-3438 | HIGH |
8.2
|
|
11 | Jan 21, 2016 | CVE-2016-0541 | MEDIUM |
5.0
|
|
12 | Jan 21, 2016 | CVE-2016-0540 | MEDIUM |
5.0
|
|
13 | Apr 01, 2002 | CVE-2002-1640 | MEDIUM |
6.8
|
|
14 | Apr 01, 2002 | CVE-2002-1639 | HIGH |
7.5
|