Логотип exploitDog
bind:CVE-2022-26672
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-26672

Количество 2

Количество 2

nvd логотип

CVE-2022-26672

почти 4 года назад

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-qr5q-3r8x-rmr4

почти 4 года назад

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-26672

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

CVSS3: 7.3
2%
Низкий
почти 4 года назад
github логотип
GHSA-qr5q-3r8x-rmr4

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

CVSS3: 7.3
2%
Низкий
почти 4 года назад

Уязвимостей на страницу