Kron Technologies Single Connect

CPE Details

Kron Technologies Single Connect
-
2023-02-24
17h23 +00:00
2023-02-28
16h57 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:krontech:single_connect:-:*:*:*:*:*:*:*

Informations

Vendor

krontech

Product

single_connect

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-0882 2023-02-17 06h44 +00:00 Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
8.8
High
CVE-2021-44795 2022-01-27 12h27 +00:00 Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other users without authenticating.
7.5
High
CVE-2021-44794 2022-01-27 12h27 +00:00 Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
5.3
Medium
CVE-2021-44793 2022-01-27 12h27 +00:00 Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
8.6
High
CVE-2021-44792 2022-01-27 12h27 +00:00 Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
5.3
Medium