2024-05-12 02:03:21 +00:00

24 lines
1022 B
JSON

{
"id": "CVE-2024-33752",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T14:15:08.003",
"lastModified": "2024-05-06T16:00:59.253",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability exists in emlog pro 2.3.0 and pro 2.3.2 at admin/views/plugin.php that could be exploited by a remote attacker to submit a special request to upload a malicious file to execute arbitrary code."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de carga de archivos arbitrarios en emlog pro 2.3.0 y pro 2.3.2 en admin/views/plugin.php que podr\u00eda ser aprovechada por un atacante remoto para enviar una solicitud especial para cargar un archivo malicioso para ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Myanemo/emlogpro/blob/main/emlog%20pro2.3.2%20File%20upload%20to%20getshell.md",
"source": "cve@mitre.org"
}
]
}