Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2022-31481

Disclosure Date: June 02, 2022 (last updated October 07, 2023)
An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. The overflowed data can allow the attacker to manipulate the “normal” code execution to that of their choosing. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable.
Attacker Value
Unknown

CVE-2020-36283

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Attacker Value
Unknown

CVE-2019-13603

Disclosure Date: July 16, 2019 (last updated November 27, 2024)
An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader Windows Biometric Framework driver 5.0.0.5. It has a statically coded initialization vector to encrypt a user's fingerprint image, resulting in weak encryption of that. This, in combination with retrieving an encrypted fingerprint image and encryption key (through another vulnerability), allows an attacker to obtain a user's fingerprint image.
Attacker Value
Unknown

CVE-2018-17489

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
EasyLobby Solo could allow a local attacker to obtain sensitive information, caused by the storing of the social security number in plaintext. By visiting the kiosk and viewing the Visitor table of the database, an attacker could exploit this vulnerability to view stored social security numbers.
0
Attacker Value
Unknown

CVE-2018-17491

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
EasyLobby Solo could allow a local attacker to gain elevated privileges on the system. By visiting the kiosk and typing "esc" to exit the program, an attacker could exploit this vulnerability to perform unauthorized actions on the computer.
0
Attacker Value
Unknown

CVE-2018-17492

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
EasyLobby Solo contains default administrative credentials. An attacker could exploit this vulnerability to gain full access to the application.
0
Attacker Value
Unknown

CVE-2018-17490

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
EasyLobby Solo is vulnerable to a denial of service. By visiting the kiosk and accessing the task manager, a local attacker could exploit this vulnerability to kill the process or launch new processes at will.
0