Assaabloy

Control Id Idsecure

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 24.06.2025 19:23:19
  • Zuletzt bearbeitet 02.07.2025 16:32:40

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL injections which could allow an attacker to leak arbitrary information and insert arbitrary SQL syntax into SQL queries.

  • EPSS 0.08%
  • Veröffentlicht 24.06.2025 19:19:42
  • Zuletzt bearbeitet 02.07.2025 16:33:10

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to a server-side request forgery vulnerability which could allow an unauthenticated attacker to retrieve information from other servers.

  • EPSS 0.11%
  • Veröffentlicht 24.06.2025 19:17:08
  • Zuletzt bearbeitet 02.07.2025 16:33:17

ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an Improper Authentication vulnerability which could allow an attacker to bypass authentication and gain permissions in the product.

  • EPSS 1.08%
  • Veröffentlicht 05.08.2023 02:15:10
  • Zuletzt bearbeitet 21.11.2024 08:05:28

A SQL injection vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing unauthenticated attackers to write PHP files on the server's root directory, resulting in remote code execution.

  • EPSS 0.59%
  • Veröffentlicht 03.08.2023 01:15:11
  • Zuletzt bearbeitet 21.11.2024 08:05:29

A path traversal vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to delete arbitrary files on IDSecure filesystem, causing a denial of service.

  • EPSS 0.19%
  • Veröffentlicht 03.08.2023 01:15:11
  • Zuletzt bearbeitet 21.11.2024 08:05:29

An uncaught exception vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to cause the main web server of IDSecure to fault and crash, causing a denial of service.

  • EPSS 0.06%
  • Veröffentlicht 03.08.2023 01:15:11
  • Zuletzt bearbeitet 21.11.2024 08:05:29

Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.

  • EPSS 0.16%
  • Veröffentlicht 03.08.2023 01:15:10
  • Zuletzt bearbeitet 21.11.2024 08:05:29

Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.

  • EPSS 0.06%
  • Veröffentlicht 14.04.2023 10:15:09
  • Zuletzt bearbeitet 21.11.2024 07:57:49

A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attac...