Vulnerabilities (CVE)

Filtered by vendor Zkteco Subscribe
Filtered by product Biotime
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-38949 1 Zkteco 1 Biotime 2023-12-10 N/A 7.5 HIGH
An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request.
CVE-2023-38951 1 Zkteco 1 Biotime 2023-12-10 N/A 9.8 CRITICAL
A path traversal vulnerability in ZKTeco BioTime v8.5.5 allows attackers to write arbitrary files via using a malicious SFTP configuration.
CVE-2023-38952 1 Zkteco 1 Biotime 2023-12-10 N/A 7.5 HIGH
Insecure access control in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read sensitive backup files and access sensitive information such as user credentials via sending a crafted HTTP request to the static files resources of the system.
CVE-2023-38950 1 Zkteco 1 Biotime 2023-12-10 N/A 7.5 HIGH
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.
CVE-2022-38803 1 Zkteco 1 Biotime 2023-12-10 N/A 6.8 MEDIUM
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-38801 1 Zkteco 1 Biotime 2023-12-10 N/A 5.4 MEDIUM
In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.
CVE-2022-38802 1 Zkteco 1 Biotime 2023-12-10 N/A 6.2 MEDIUM
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-30515 1 Zkteco 1 Biotime 2023-12-10 N/A 5.3 MEDIUM
ZKTeco BioTime 8.5.4 is missing authentication on folders containing employee photos, allowing an attacker to view them through filename enumeration.