A vulnerability, which was classified as critical, has been found in Anhui Deshun Intelligent Technology Jieshun JieLink+ JSOTC2016 up to 20240805. This issue affects some unknown processing of the file /report/ParkChargeRecord/GetDataList. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.275069 | Permissions Required VDB Entry |
https://vuldb.com/?id.275069 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.387124 | Third Party Advisory VDB Entry |
https://wiki.shikangsi.com/post/share/fd390bd7-2d60-4ffb-87da-f72cc900f61c | Exploit Third Party Advisory |
Configurations
History
21 Aug 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuldb.com/?ctiid.275069 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.275069 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.387124 - Third Party Advisory, VDB Entry | |
References | () https://wiki.shikangsi.com/post/share/fd390bd7-2d60-4ffb-87da-f72cc900f61c - Exploit, Third Party Advisory | |
First Time |
Jielink\+ Jsotc2016 Project jielink\+ Jsotc2016
Jielink\+ Jsotc2016 Project |
|
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 9.8 |
CPE | cpe:2.3:a:jielink\+_jsotc2016_project:jielink\+_jsotc2016:*:*:*:*:*:*:*:* |
19 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-19 00:15
Updated : 2024-08-21 12:30
NVD link : CVE-2024-7919
Mitre link : CVE-2024-7919
CVE.ORG link : CVE-2024-7919
JSON object : View
Products Affected
jielink\+_jsotc2016_project
- jielink\+_jsotc2016
CWE