ipTIME n104r3 suffers from cross site request forgery and cross site scripting vulnerabilities.
988ca878ce6179d51150c2f47fb8f400ba022e083a41c70fc0745929e4016338
ipTIME firmwares prior to 9.58 version are vulnerable to a remote code execution which gives root privileges.
cd01cc958b5a5d25410fa302b397b41cbb8e3c60aeea75c3e8b750358fe48d1f
Many 112 ipTIME routers / modems / firewalls suffer from a remote root code execution vulnerability.
fc4b268b4814bbad49e3581dca82b41858ee28e67ff5515ee4dee66d9f8e5093
FreeBSD Security Advisory - The default permission set by bsdinstall installer when configuring full disk encrypted ZFS is too open. A local attacker may be able to get a copy of the geli provider's keyfile which is located at a fixed location.
b3caa52ef726a17708288086b7ed4e36096670a967e1bef2ea0c8a10159dd6d1
FreeBSD 10.x installer supports the installation of FreeBSD 10.x on an encrypted ZFS filesystem by default. When using the encryption system within ZFS during the installation of FreeBSD 10.0 and FreeBSD 10.1, the encryption.key has wrong permissions which allow local users to read this file. Even if the keyfile is passphrase-encrypted, it can present a risk.
2d73956e559f4d283ab25bf45d7bdbe684659d4e06b9a91ed68cecd406c970cf