Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-38309
Deferred
More InfoOfficial Page
Source-vultures@jpcert.or.jp
View Known Exploited Vulnerability (KEV) details
Published At-28 Nov, 2024 | 03:15
Updated At-15 Apr, 2026 | 00:35

There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-121Secondaryvultures@jpcert.or.jp
CWE ID: CWE-121
Type: Secondary
Source: vultures@jpcert.or.jp
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://jvn.jp/en/vu/JVNVU97531313/vultures@jpcert.or.jp
N/A
https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.phpvultures@jpcert.or.jp
N/A
Hyperlink: https://jvn.jp/en/vu/JVNVU97531313/
Source: vultures@jpcert.or.jp
Resource: N/A
Hyperlink: https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php
Source: vultures@jpcert.or.jp
Resource: N/A
Change History
0Changes found

Details not found