Page 6 of 32 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

ZKteco ZKBioSecurity V5000 4.1.3 was discovered to contain a SQL injection vulnerability via the component /baseOpLog.do. Se ha detectado que ZKteco ZKBioSecurity V5000 versión 4.1.3, contiene una vulnerabilidad de inyección SQL por medio del componente /baseOpLog.do ZKSecurity BIO version 4.1.2 suffers from a remote SQL injection vulnerability that can allow for remote code execution. • http://zkbiosecurity.com http://zkteco.com https://medium.com/stolabs/cve-2022-36635-a-sql-injection-in-zksecuritybio-to-rce-c5bde2962d47 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

A token-reuse vulnerability in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to create arbitrary new users, elevate users to administrators, delete users, and download user faces from the database. Una vulnerabilidad de reutilización de tokens en ZKTeco FaceDepot versión 7B 1.0.213 y ZKBiosecurity Server versión 1.0.0_20190723, permite a un atacante crear nuevos usuarios arbitrarios, elevar usuarios a administradores, eliminar usuarios y descargar caras de usuarios desde la base de datos. • https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability • CWE-613: Insufficient Session Expiration •

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 0

Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server. Una falta de autenticación mutua en ZKTeco FaceDepot versión 7B 1.0.213 y ZKBiosecurity Server versión 1.0.0_20190723, permite a un atacante obtener un token de larga duración al hacerse pasar por el servidor. • https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability • CWE-613: Insufficient Session Expiration •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The ZKTime Web Software 2.0.1.12280 allows the Administrator to elevate the privileges of the application user using a 'password_change()' function of the Modify Password component, reachable via the old_password, new_password1, and new_password2 parameters to the /accounts/password_change/ URI. An attacker takes advantage of this scenario and creates a crafted CSRF link to add himself as an administrator to the ZKTime Web Software. He then uses social engineering methods to trick the administrator into clicking the forged HTTP request. The request is executed and the attacker becomes the Administrator of the ZKTime Web Software. If the vulnerability is successfully exploited, then an attacker (who would be a normal user of the web application) can escalate his privileges and become the administrator of ZKTime Web Software. • http://packetstormsecurity.com/files/145160/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Request-Forgery.html http://www.securityfocus.com/bid/102007 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

There is a reflected XSS vulnerability in ZKTime Web 2.0.1.12280. The vulnerability exists due to insufficient filtration of user-supplied data in the 'Range' field of the 'Department' module in a Personnel Advanced Query. A remote attacker can execute arbitrary HTML and script code in the browser in the context of the vulnerable application. Hay una vulnerabilidad de XSS reflejado en ZKTime Web 2.0.1.12280. La vulnerabilidad existe debido a la filtración insuficiente de datos proporcionados por el usuario en el campo "Range" del módulo "Department" en una consulta Personnel Advanced Query. • http://packetstormsecurity.com/files/145159/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Scripting.html http://www.securityfocus.com/bid/102006 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •