Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16632 | Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR. |
Mon, 20 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-73 |
Mon, 19 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Sep 2024 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Thu, 05 Sep 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR. | Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR. |
| Weaknesses | CWE-73 |
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2026-04-20T13:54:19.110Z
Reserved: 2024-01-24T02:36:01.693Z
Link: CVE-2024-0849
Updated: 2024-08-01T18:18:18.789Z
Status : Modified
Published: 2024-02-07T03:15:50.083
Modified: 2026-04-20T16:16:38.537
Link: CVE-2024-0849
No data.
OpenCVE Enrichment
No data.
EUVD