CVE-2022-36536

An issue in the component post_applogin.php of Super Flexible Software GmbH & Co. KG Syncovery 9 for Linux v9.47x and below allows attackers to escalate privileges via creating crafted session tokens.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:syncovery:syncovery:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:13

Type Values Removed Values Added
References () http://super.com - Not Applicable () http://super.com - Not Applicable
References () http://syncovery.com - Broken Link () http://syncovery.com - Broken Link
References () https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/ - Exploit, Third Party Advisory () https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/ - Exploit, Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-269 CWE-330

Information

Published : 2022-09-16 03:15

Updated : 2024-11-21 07:13


NVD link : CVE-2022-36536

Mitre link : CVE-2022-36536

CVE.ORG link : CVE-2022-36536


JSON object : View

Products Affected

linux

  • linux_kernel

syncovery

  • syncovery
CWE
CWE-330

Use of Insufficiently Random Values