Show filters
65 Total Results
Displaying 61-65 of 65
Sort by:
Attacker Value
Unknown
CVE-2020-3935
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers.
0
Attacker Value
Unknown
CVE-2020-3933
Disclosure Date: February 11, 2020 (last updated November 27, 2024)
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.
0
Attacker Value
Unknown
CVE-2019-7385
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
0
Attacker Value
Unknown
CVE-2019-7384
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below. The value of the fmgpon_loid parameter is used in a system call inside the boa binary. Because there is no user input validation, this leads to authenticated code execution on the device.
0
Attacker Value
Unknown
CVE-2002-2137
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
GlobalSunTech Wireless Access Points (1) WISECOM GL2422AP-0T, and possibly OEM products such as (2) D-Link DWL-900AP+ B1 2.1 and 2.2, (3) ALLOY GL-2422AP-S, (4) EUSSO GL2422-AP, and (5) LINKSYS WAP11-V2.2, allow remote attackers to obtain sensitive information like WEP keys, the administrator password, and the MAC filter via a "getsearch" request to UDP port 27155.
0