OMFLOW from The SYSCOM Group does not properly validate user input of the download functionality, allowing remote attackers with regular privileges to read arbitrary system files.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/en/cp-139-8074-66457-2.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-8073-ff771-1.html | Third Party Advisory |
Configurations
History
20 Sep 2024, 14:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/en/cp-139-8074-66457-2.html - Third Party Advisory | |
References | () https://www.twcert.org.tw/tw/cp-132-8073-ff771-1.html - Third Party Advisory | |
CPE | cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:* | |
CWE | CWE-22 | |
First Time |
Syscomgo omflow
Syscomgo |
16 Sep 2024, 15:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-16 06:15
Updated : 2024-09-20 14:23
NVD link : CVE-2024-8778
Mitre link : CVE-2024-8778
CVE.ORG link : CVE-2024-8778
JSON object : View
Products Affected
syscomgo
- omflow