Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown
CVE-2021-43283
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.
0
Attacker Value
Unknown
CVE-2021-43282
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
0
Attacker Value
Unknown
CVE-2020-15744
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Stack-based Buffer Overflow vulnerability in the ONVIF server component of Victure PC420 smart camera allows an attacker to execute remote code on the target device. This issue affects: Victure PC420 firmware version 1.2.2 and prior versions.
0
Attacker Value
Unknown
CVE-2021-34682
Disclosure Date: June 12, 2021 (last updated November 28, 2024)
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
0
Attacker Value
Unknown
CVE-2020-12717
Disclosure Date: May 14, 2020 (last updated November 08, 2023)
The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.
0
Attacker Value
Unknown
CVE-2019-20456
Disclosure Date: February 16, 2020 (last updated February 21, 2025)
Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.
0
Attacker Value
Unknown
CVE-2019-15940
Disclosure Date: October 01, 2019 (last updated November 27, 2024)
Victure PC530 devices allow unauthenticated TELNET access as root.
0
Attacker Value
Unknown
CVE-2019-15569
Disclosure Date: August 26, 2019 (last updated November 27, 2024)
HM Courts & Tribunals ccd-data-store-api before 2019-06-10 allows SQL injection, related to SearchQueryFactoryOperation.java and SortDirection.java.
0
Attacker Value
Unknown
CVE-2014-5866
Disclosure Date: September 11, 2014 (last updated October 05, 2023)
The CA DMV (aka gov.ca.dmv) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-5772
Disclosure Date: September 09, 2014 (last updated October 05, 2023)
The Government Bookstore (aka hksarg.isd.sop.govbookstore) application 1.01 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0