Page 5 of 32 results (0.001 seconds)

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 1

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF Zkteco BioTime &lt; 8.5.3 Build:20200816.447 es vulnerable a un control de acceso incorrecto mediante renuncia, mensaje privado, registro manual, intervalo de tiempo, attshift y vacaciones. Un administrador autenticado puede leer archivos locales explotando XSS en un generador de PDF al exportar datos como PDF. • https://gist.github.com/hamoshwani/fd7e3d9d9ff8896f1ccf8426dccaf97e https://www.zkteco.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF Zkteco BioTime &lt; 8.5.3 Build:20200816.447 es vulnerable a un control de acceso incorrecto mediante permisos, horas extras y registro manual. Un empleado autenticado puede leer archivos locales explotando XSS en un generador de PDF al exportar datos como PDF. • https://gist.github.com/hamoshwani/44653bfe7b8cc461692a2f074b1ef475 https://www.zkteco.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

ZKTeco BioTime 8.5.4 is missing authentication on folders containing employee photos, allowing an attacker to view them through filename enumeration. ZKTeco BioTime 8.5.4 le falta autenticación en las carpetas que contienen fotografías de empleados, lo que permite a un atacante verlas mediante la enumeración de nombres de archivos. • https://codingkoala.eu/posts/CVE202230515 https://www.zkteco.me/software-5 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 3

Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210). • https://www.exploit-db.com/exploits/51112 https://seclists.org/fulldisclosure/2022/Oct/23 https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An access control issue in ZKTeco ZKBioSecurity V5000 3.0.5_r allows attackers to arbitrarily create admin users via a crafted HTTP request. Un problema de control de acceso en ZKTeco ZKBioSecurity V5000 versión 3.0.5_r permite a atacantes crear arbitrariamente usuarios administradores por medio de una petición HTTP diseñada ZKSecurity BIO version 3.0.5.0_R suffers from a privilege escalation vulnerability. • http://zkbiosecurity.com http://zkteco.com https://seclists.org/fulldisclosure/2022/Sep/29 • CWE-863: Incorrect Authorization •