Metrics
Affected Vendors & Products
Thu, 18 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 17 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbbroadcast sft Dab 015\/c
Dbbroadcast sft Dab 015\/c Firmware Dbbroadcast sft Dab 050\/c Dbbroadcast sft Dab 050\/c Firmware Dbbroadcast sft Dab 150\/c Dbbroadcast sft Dab 150\/c Firmware Dbbroadcast sft Dab 300\/c Dbbroadcast sft Dab 300\/c Firmware Dbbroadcast sft Dab 600\/c Dbbroadcast sft Dab 600\/c Firmware |
|
| CPEs | cpe:2.3:h:dbbroadcast:sft_dab_015\/c:-:*:*:*:*:*:*:* cpe:2.3:h:dbbroadcast:sft_dab_050\/c:-:*:*:*:*:*:*:* cpe:2.3:h:dbbroadcast:sft_dab_150\/c:-:*:*:*:*:*:*:* cpe:2.3:h:dbbroadcast:sft_dab_300\/c:-:*:*:*:*:*:*:* cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:* cpe:2.3:o:dbbroadcast:sft_dab_015\/c_firmware:1.9.3:*:*:*:*:*:*:* cpe:2.3:o:dbbroadcast:sft_dab_050\/c_firmware:1.9.3:*:*:*:*:*:*:* cpe:2.3:o:dbbroadcast:sft_dab_150\/c_firmware:1.9.3:*:*:*:*:*:*:* cpe:2.3:o:dbbroadcast:sft_dab_300\/c_firmware:1.9.3:*:*:*:*:*:*:* cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dbbroadcast sft Dab 015\/c
Dbbroadcast sft Dab 015\/c Firmware Dbbroadcast sft Dab 050\/c Dbbroadcast sft Dab 050\/c Firmware Dbbroadcast sft Dab 150\/c Dbbroadcast sft Dab 150\/c Firmware Dbbroadcast sft Dab 300\/c Dbbroadcast sft Dab 300\/c Firmware Dbbroadcast sft Dab 600\/c Dbbroadcast sft Dab 600\/c Firmware |
|
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbbroadcast
Dbbroadcast sft Dab Series |
|
| Vendors & Products |
Dbbroadcast
Dbbroadcast sft Dab Series |
Wed, 10 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without proper authorization. | |
| Title | Screen SFT DAB 1.9.3 Authentication Bypass via IP Session Management | |
| Weaknesses | CWE-384 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-18T20:14:50.852Z
Reserved: 2025-12-07T13:16:38.432Z
Link: CVE-2023-53741
Updated: 2025-12-11T15:52:00.860Z
Status : Modified
Published: 2025-12-10T21:16:03.420
Modified: 2025-12-18T21:15:50.460
Link: CVE-2023-53741
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:20:14Z