Powercom Co., Ltd.
Products
1- 4 CVEs
Recent CVEs
4| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-38121 | 0.07 | — | 0.44 | Nov 10, 2022 | UPSMON PRO configuration file stores user password in plaintext under public user directory. A remote attacker with general user privilege can access all users‘ and administrators' account names and passwords via this unprotected configuration file. | ||
| CVE-2022-38120 | 0.07 | — | 0.48 | Nov 10, 2022 | UPSMON PRO’s has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to bypass authentication and access arbitrary system files. | ||
| CVE-2022-38122 | 0.00 | — | 0.00 | Nov 10, 2022 | UPSMON PRO transmits sensitive data in cleartext over HTTP protocol. An unauthenticated remote attacker can exploit this vulnerability to access sensitive data. | ||
| CVE-2022-38119 | 0.00 | — | 0.03 | Nov 10, 2022 | UPSMON Pro login function has insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and get administrator privilege to access, control system or disrupt service. |
- CVE-2022-38121Nov 10, 2022risk 0.07cvss —epss 0.44
UPSMON PRO configuration file stores user password in plaintext under public user directory. A remote attacker with general user privilege can access all users‘ and administrators' account names and passwords via this unprotected configuration file.
- CVE-2022-38120Nov 10, 2022risk 0.07cvss —epss 0.48
UPSMON PRO’s has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to bypass authentication and access arbitrary system files.
- CVE-2022-38122Nov 10, 2022risk 0.00cvss —epss 0.00
UPSMON PRO transmits sensitive data in cleartext over HTTP protocol. An unauthenticated remote attacker can exploit this vulnerability to access sensitive data.
- CVE-2022-38119Nov 10, 2022risk 0.00cvss —epss 0.03
UPSMON Pro login function has insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and get administrator privilege to access, control system or disrupt service.