Hitron CODA-5310 has hard-coded encryption/decryption keys in the program code. A remote attacker authenticated as an administrator can decrypt system files using the hard-coded keys for file access, ...
Continue ReadingJune 02, 2023
ELITE TECHNOLOGY CORP. Web Fax has a vulnerability of SQL Injection. An unauthenticated remote attacker can inject SQL commands into the input field of the login page to perform arbitrary system comma ...
Continue ReadingJune 02, 2023
SGUDA U-Lock central lock control serviceâs lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs t ...
Continue ReadingJune 02, 2023
ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack t ...
Continue ReadingJune 02, 2023
Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain ...
Continue ReadingJune 02, 2023
Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit ...
Continue ReadingJune 02, 2023
Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulner ...
Continue ReadingJune 02, 2023
Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator priv ...
Continue ReadingJune 02, 2023
Back to Main