Authentication bypass vulnerability in the setup screen of L2Blocker(on-premise) Ver4.8.5 and earlier and L2Blocker(Cloud) Ver4.8.5 and earlier allows an adjacent attacker to perform an unauthorized login and obtain the stored information or cause a malfunction of the device by using alternative paths or channels for Sensor. (CVSS:4.8) (Last Update:2022-07-07) Latest security vulnerabilities (Bypass) (CVSS score >= 4)
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions With Community Driven Insights
In this paper, the authors present the efforts behind building a Special Interest Group (SIG) that seeks to develop a completely data-driven exploit scoring system