Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ZKTeco Inc. | ZKTeco ZKTime.Net | 3.0.1.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2016-20026 | 9.8 CRITICAL | ZKTeco ZKBioSecurity 3.0 Hardcoded Credentials Remote Code Execution |
| CVE-2016-20030 | 9.8 CRITICAL | ZKTeco ZKBioSecurity 3.0 User Enumeration via authLoginAction |
| CVE-2016-20025 | 8.8 HIGH | ZKTeco ZKAccess Professional 3.5.3 Privilege Escalation via Insecure Permissions |
| CVE-2016-20032 | 7.2 HIGH | ZKTeco ZKAccess Security System 5.3.1 Stored XSS |
| CVE-2016-20029 | 6.2 MEDIUM | ZKTeco ZKBioSecurity 3.0 File Path Manipulation Vulnerability |
| CVE-2016-20027 | 6.1 MEDIUM | ZKTeco ZKBioSecurity 3.0 Multiple Reflected XSS Vulnerabilities |
| CVE-2016-20031 | 5.5 MEDIUM | ZKTeco ZKBioSecurity 3.0 Local Authorization Bypass via visLogin.jsp |
| CVE-2016-20028 | 4.3 MEDIUM | ZKTeco ZKBioSecurity 3.0 Cross-Site Request Forgery Superadmin |
No comments yet