Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
autMan
- 2.9.6
Source
cve@mitre.org
Tags
CVE-2024-43032 details
Published : Aug. 23, 2024, 4:15 p.m.
Last Modified : Aug. 23, 2024, 6:15 p.m.
Last Modified : Aug. 23, 2024, 6:15 p.m.
Description
autMan v2.9.6 allows attackers to bypass authentication via a crafted web request.
CVSS Score
1 | 2 | 3 | 4.3 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-121 | Stack-based Buffer Overflow | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
CVSS Data
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
4.3
Exploitability Score
0.9
Impact Score
3.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
References
URL | Source |
---|---|
https://github.com/hdbjlizhe/fanli/releases/tag/2.9.6 | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.