Sahoâs attendance devices ADM100 and ADM-100FP have a vulnerability of missing authentication for critical functions. An unauthenticated remote attacker can execute system commands in partial web ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam FHD 2âs hidden Telnet function has a vulnerability of using hard-coded Telnet credentials. An remote unauthenticated attacker can exploit this vulnerability to access th ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam FHD 2âs hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injectio ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam FHD 2 has a vulnerability of using hard-coded uBoot credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam Senseâs hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injectio ...
Continue ReadingAugust 28, 2023
Keystone is an open source headless CMS for Node.js â built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no sessi ...
Continue ReadingAugust 27, 2023
An issue in Konga v0.14.9 allows attackers to bypass authentication via a crafted JWT token.Read More ...
Continue ReadingAugust 27, 2023
Dispatch is an open source security incident management tool. The server response includes the JWT Secret Key used for signing JWT tokens in error message when the `Dispatch Plugin - Basic Authenticat ...
Continue ReadingAugust 27, 2023
Back to Main