Sangfor Operation and Maintenance Management System har 3.0.12 SSH Protocol session SessionController keypassword kura hakki ndiyam
Wuro vulnerability wey an yi classify sey kura an gano shi a cikin Sangfor Operation and Maintenance Management System har 3.0.12. Gaskiya, SessionController na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /isomp-protocol/protocol/session na cikin fayil, SSH Protocol Handler na cikin sashi. Ngam manipulation of the argument keypassword shi kura hakki ndiyam. CWE shidin ka a yi bayani matsala sai ya kai CWE-78. Gaskiya, laifi an fitar da shi 01/22/2026. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2026-1324. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.
4 Goyarwa · 101 Datenpunkte