Vulnerabilities (CVE)

Filtered by vendor Krontech Subscribe
Filtered by product Single Connect
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-0882 2 Krontech, Microsoft 2 Single Connect, Windows 2024-11-21 N/A 8.8 HIGH
Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
CVE-2021-44795 1 Krontech 1 Single Connect 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other users without authenticating.
CVE-2021-44794 1 Krontech 1 Single Connect 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
CVE-2021-44793 1 Krontech 1 Single Connect 2024-11-21 5.0 MEDIUM 8.6 HIGH
Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
CVE-2021-44792 1 Krontech 1 Single Connect 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.