Category: CVSS2 - MEDIUM
Exploit for Authentication Bypass by Spoofing in Python-Jwt Project Python-Jwt

# CVE-2022-39227 CVE-2022-39227 : Proof of Concept Proof of co...Read More ...

Continue Reading
CVE-2023-0985

An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version Read More ...

Continue Reading
CVE-2023-1779

Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions Read More ...

Continue Reading
Exploit for Vulnerability in Gitlab

# CVE-2021-4191_Exploits pip install python-gra...Read More ...

Continue Reading
CVE-2022-47616

Hitron CODA-5310 has insufficient filtering for specific parameters in the connection test function. A remote attacker authenticated as an administrator, can use the management page to perform command ...

Continue Reading
CVE-2022-46308

SGUDA U-Lock central lock control service’s user management function has incorrect authorization. A remote attacker with general user privilege can exploit this vulnerability to call privileged A ...

Continue Reading
CVE-2023-30602

Hitron Technologies CODA-5310’s Telnet function transfers sensitive data in plaintext. An unauthenticated remote attacker can exploit this vulnerability to access credentials of normal users and ...

Continue Reading
CVE-2022-47617

Hitron CODA-5310 has hard-coded encryption/decryption keys in the program code. A remote attacker authenticated as an administrator can decrypt system files using the hard-coded keys for file access, ...

Continue Reading
CVE-2022-46307

SGUDA U-Lock central lock control service’s lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs t ...

Continue Reading
CVE-2023-28702

ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack t ...

Continue Reading
Load more