The CAYIN Technology CMS lacks proper access control, allowing unauthenticated remote attackers to download arbitrary CGI files.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cayintech
Cayintech cms-20 Cayintech cms-60 Cayintech cms-se Cayintech cms-se\(18.04\) Cayintech cms-se\(22.04\) Cayintech smp-2100 Cayintech smp-2200 Cayintech smp-2210 Cayintech smp-2300 Cayintech smp-2310 Cayintech smp-2400 Cayintech smp-6000 Cayintech smp-8000 Cayintech smp-8000qd Cayintech smp-8100 |
|
CPEs | cpe:2.3:h:cayintech:cms-20:11.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:cms-60:11.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:cms-se:11.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:cms-se\(18.04\):11.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:cms-se\(22.04\):11.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2100:3.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2200:*:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2210:*:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2300:*:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2310:*:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-2400:4.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-6000:3.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-8000:3.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-8000qd:3.0:*:*:*:*:*:*:* cpe:2.3:h:cayintech:smp-8100:4.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Cayintech
Cayintech cms-20 Cayintech cms-60 Cayintech cms-se Cayintech cms-se\(18.04\) Cayintech cms-se\(22.04\) Cayintech smp-2100 Cayintech smp-2200 Cayintech smp-2210 Cayintech smp-2300 Cayintech smp-2310 Cayintech smp-2400 Cayintech smp-6000 Cayintech smp-8000 Cayintech smp-8000qd Cayintech smp-8100 |
|
Metrics |
ssvc
|
Wed, 14 Aug 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The CAYIN Technology CMS lacks proper access control, allowing unauthenticated remote attackers to download arbitrary CGI files. | |
Title | CAYIN Technology CMS - Sensitive File Download | |
Weaknesses | CWE-552 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-16T15:46:19.420Z
Reserved: 2024-08-13T06:08:30.865Z
Link: CVE-2024-7729

Updated: 2024-08-16T15:46:04.116Z

Status : Awaiting Analysis
Published: 2024-08-14T04:15:07.150
Modified: 2024-08-14T13:00:37.107
Link: CVE-2024-7729

No data.