Metrics
Affected Vendors & Products
Wed, 30 Oct 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Riskengine
Riskengine radar |
|
CPEs | cpe:2.3:a:riskengine:radar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Riskengine
Riskengine radar |
Fri, 18 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Radar
Radar radar |
|
CPEs | cpe:2.3:a:radar:radar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Radar
Radar radar |
|
Metrics |
ssvc
|
Fri, 18 Oct 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | wfh45678 Radar Interface authorization | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-10-18T18:31:04.852Z
Updated: 2024-10-18T18:48:19.916Z
Reserved: 2024-10-18T12:07:19.660Z
Link: CVE-2024-10121
Updated: 2024-10-18T18:47:55.294Z
Status : Analyzed
Published: 2024-10-18T19:15:13.707
Modified: 2024-10-30T21:21:02.083
Link: CVE-2024-10121
No data.