Metrics
Affected Vendors & Products
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 30 Oct 2024 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Riskengine Riskengine radar | |
| CPEs | cpe:2.3:a:riskengine:radar:*:*:*:*:*:*:*:* | |
| Vendors & Products | Riskengine Riskengine radar | 
Fri, 18 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Radar Radar radar | |
| CPEs | cpe:2.3:a:radar:radar:*:*:*:*:*:*:*:* | |
| Vendors & Products | Radar Radar radar | |
| Metrics | ssvc 
 | 
Fri, 18 Oct 2024 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | wfh45678 Radar Interface authorization | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV2_0 
 
 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulDB
Published: 2024-10-18T18:31:04.852Z
Updated: 2024-10-18T18:48:19.916Z
Reserved: 2024-10-18T12:07:19.660Z
Link: CVE-2024-10121
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-10-18T18:47:55.294Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-10-18T19:15:13.707
Modified: 2024-10-30T21:21:02.083
Link: CVE-2024-10121
 Redhat
                        Redhat
                    No data.