The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Teamplus team\+ Pro
|
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:teamplus:team\+_pro:*:*:*:*:private_cloud:android:*:* | |
Vendors & Products |
Teamplus team\+ Pro
|
Tue, 15 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Teamplus
Teamplus team\+ |
|
CPEs | cpe:2.3:a:teamplus:team\+:*:*:*:*:*:*:*:* | |
Vendors & Products |
Teamplus
Teamplus team\+ |
|
Metrics |
ssvc
|
Mon, 14 Oct 2024 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. | |
Title | TEAMPLUS TECHNOLOGY Team+ - Arbitrary File Read through Path Traversal | |
Weaknesses | CWE-23 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-10-15T18:20:33.844Z
Reserved: 2024-10-14T02:10:15.245Z
Link: CVE-2024-9922

Updated: 2024-10-15T18:20:26.988Z

Status : Analyzed
Published: 2024-10-14T03:15:10.683
Modified: 2024-10-24T13:21:53.853
Link: CVE-2024-9922

No data.