Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-51413 | A vulnerability, which was classified as critical, has been found in ZeroWdd myblog 1.0. This issue affects the function upload of the file src/main/java/com/wdd/myblog/controller/admin/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
Wed, 28 May 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zerowdd
Zerowdd myblog |
|
| CPEs | cpe:2.3:a:zerowdd:myblog:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Zerowdd
Zerowdd myblog |
Thu, 09 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, has been found in ZeroWdd myblog 1.0. This issue affects the function upload of the file src/main/java/com/wdd/myblog/controller/admin/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | ZeroWdd myblog uploadController.java upload unrestricted upload | |
| Weaknesses | CWE-284 CWE-434 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-01-09T16:38:53.842Z
Reserved: 2025-01-08T12:04:58.742Z
Link: CVE-2024-13191
Updated: 2025-01-09T16:38:38.384Z
Status : Analyzed
Published: 2025-01-08T23:15:08.807
Modified: 2025-05-28T20:11:52.477
Link: CVE-2024-13191
No data.
OpenCVE Enrichment
No data.
EUVD