CVE-2024-33865

An issue was discovered in linqi before 1.4.0.1 on Windows. There is an NTLM hash leak via the /api/Cdn/GetFile and /api/DocumentTemplate/{GUID] endpoints.
Configurations

No configuration.

History

21 Nov 2024, 09:17

Type Values Removed Values Added
References () https://linqi.help/Updates/en#/SecurityUpdates - () https://linqi.help/Updates/en#/SecurityUpdates -
References () https://www.linqi.de/de-DE/blog.html - () https://www.linqi.de/de-DE/blog.html -

04 Sep 2024, 20:35

Type Values Removed Values Added
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) Se descubrió un problema en linqi anterior a 1.4.0.1 en Windows. Hay una fuga de hash NTLM a través de los endpoints /api/Cdn/GetFile y /api/DocumentTemplate/{GUID].

14 May 2024, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 16:17

Updated : 2024-11-21 09:17


NVD link : CVE-2024-33865

Mitre link : CVE-2024-33865

CVE.ORG link : CVE-2024-33865


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor