Techno Project Japan Enisys Gw before 1.4.1 allows remote authenticated users to write to arbitrary files and consequently execute arbitrary code via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN33179297/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000168 | Vendor Advisory |
http://www.tpj.co.jp/enisys/resource.html | Vendor Advisory |
http://jvn.jp/en/jp/JVN33179297/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000168 | Vendor Advisory |
http://www.tpj.co.jp/enisys/resource.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN33179297/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000168 - Vendor Advisory | |
References | () http://www.tpj.co.jp/enisys/resource.html - Vendor Advisory |
Information
Published : 2015-10-29 11:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5669
Mitre link : CVE-2015-5669
CVE.ORG link : CVE-2015-5669
JSON object : View
Products Affected
techno_project_japan
- enisys_gw
CWE