CVE-2024-7693

Raiden MAILD Remote Management System from Team Johnlong Software has a Relative Path Traversal vulnerability, allowing unauthenticated remote attackers to read arbitrary file on the remote server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*

History

06 Sep 2024, 16:51

Type Values Removed Values Added
CWE CWE-22
References () https://www.twcert.org.tw/en/cp-139-7999-208bf-2.html - () https://www.twcert.org.tw/en/cp-139-7999-208bf-2.html - Third Party Advisory
References () https://www.twcert.org.tw/tw/cp-132-7997-31bef-1.html - () https://www.twcert.org.tw/tw/cp-132-7997-31bef-1.html - Third Party Advisory
Summary
  • (es) El sistema de gestión remota Raiden MAILD del Team Johnlong Software tiene una vulnerabilidad de Path Traversal relativo, que permite a atacantes remotos no autenticados leer archivos arbitrarios en el servidor remoto.
First Time Raidenmaild
Raidenmaild raidenmaild
CPE cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*

12 Aug 2024, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 13:38

Updated : 2024-09-06 16:51


NVD link : CVE-2024-7693

Mitre link : CVE-2024-7693

CVE.ORG link : CVE-2024-7693


JSON object : View

Products Affected

raidenmaild

  • raidenmaild
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal