Product:

Dr\.id_access_control

(Secom)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 6
Date Id Summary Products Score Patch Annotated
2024-08-14 CVE-2024-7731 Dr.ID Access Control System from SECOM does not properly validate a specific page parameter, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents. Dr\.id_access_control 9.8
2022-04-07 CVE-2022-26671 Taiwan Secom Dr.ID Access Control system’s login page has a hard-coded credential in the source code. An unauthenticated remote attacker can use the hard-coded credential to acquire partial system information and modify system setting to cause partial disrupt of service. Dr\.id_access_control, Dr\.id_attendance_system 7.3
2020-02-11 CVE-2020-3933 TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system. Dr\.id_access_control, Dr\.id_attendance_system 5.3
2020-02-11 CVE-2020-3934 TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, contains a vulnerability of Pre-auth SQL Injection, allowing attackers to inject a specific SQL command. Dr\.id_access_control, Dr\.id_attendance_system 9.8
2020-02-11 CVE-2020-3935 TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers. Dr\.id_access_control, Dr\.id_attendance_system 7.5
2021-07-16 CVE-2021-35961 Dr. ID Door Access Control and Personnel Attendance Management system uses the hard-code admin default credentials that allows remote attackers to access the system through the default password and obtain the highest permission. Dr\.id_access_control 9.8