Techno Project Japan Enisys Gw before 1.4.1 allows remote attackers to bypass intended access restrictions and read arbitrary uploaded files via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN68289108/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000170 | Vendor Advisory |
http://www.tpj.co.jp/enisys/resource.html | Vendor Advisory |
http://jvn.jp/en/jp/JVN68289108/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000170 | Vendor Advisory |
http://www.tpj.co.jp/enisys/resource.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN68289108/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000170 - Vendor Advisory | |
References | () http://www.tpj.co.jp/enisys/resource.html - Vendor Advisory |
Information
Published : 2015-10-29 11:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5671
Mitre link : CVE-2015-5671
CVE.ORG link : CVE-2015-5671
JSON object : View
Products Affected
techno_project_japan
- enisys_gw
CWE
CWE-264
Permissions, Privileges, and Access Controls