Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown

CVE-2021-43283

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.
Attacker Value
Unknown

CVE-2021-43282

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
Attacker Value
Unknown

CVE-2020-15744

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Stack-based Buffer Overflow vulnerability in the ONVIF server component of Victure PC420 smart camera allows an attacker to execute remote code on the target device. This issue affects: Victure PC420 firmware version 1.2.2 and prior versions.
Attacker Value
Unknown

CVE-2021-34682

Disclosure Date: June 12, 2021 (last updated November 28, 2024)
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
Attacker Value
Unknown

CVE-2020-12717

Disclosure Date: May 14, 2020 (last updated November 08, 2023)
The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.
Attacker Value
Unknown

CVE-2019-20456

Disclosure Date: February 16, 2020 (last updated February 21, 2025)
Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.
Attacker Value
Unknown

CVE-2019-15940

Disclosure Date: October 01, 2019 (last updated November 27, 2024)
Victure PC530 devices allow unauthenticated TELNET access as root.
Attacker Value
Unknown

CVE-2019-15569

Disclosure Date: August 26, 2019 (last updated November 27, 2024)
HM Courts & Tribunals ccd-data-store-api before 2019-06-10 allows SQL injection, related to SearchQueryFactoryOperation.java and SortDirection.java.
0
Attacker Value
Unknown

CVE-2014-5866

Disclosure Date: September 11, 2014 (last updated October 05, 2023)
The CA DMV (aka gov.ca.dmv) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown

CVE-2014-5772

Disclosure Date: September 09, 2014 (last updated October 05, 2023)
The Government Bookstore (aka hksarg.isd.sop.govbookstore) application 1.01 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0