We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw.
Reserved 2025-01-09 | Published 2025-03-21 | Updated 2025-03-24 | Assigner mitregist.github.com/NaliangzzZ/44bfcc1d9c2cf275d2b6683ca9e20980
Support options