An issue in the component post_applogin.php of Super Flexible Software GmbH & Co. KG Syncovery 9 for Linux v9.47x and below allows attackers to escalate privileges via creating crafted session tokens.
References
Link | Resource |
---|---|
http://super.com | Not Applicable |
http://syncovery.com | Broken Link |
https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/ | Exploit Third Party Advisory |
http://super.com | Not Applicable |
http://syncovery.com | Broken Link |
https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://super.com - Not Applicable | |
References | () http://syncovery.com - Broken Link | |
References | () https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/ - Exploit, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-330 |
Information
Published : 2022-09-16 03:15
Updated : 2024-11-21 07:13
NVD link : CVE-2022-36536
Mitre link : CVE-2022-36536
CVE.ORG link : CVE-2022-36536
JSON object : View
Products Affected
linux
- linux_kernel
syncovery
- syncovery
CWE
CWE-330
Use of Insufficiently Random Values