Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-35857 | In the mintupload package through 4.2.0 for Linux Mint, service-name mishandling leads to command injection via shell metacharacters in check_connection, drop_data_received_cb, and Service.remove. A user can modify a service name in a ~/.linuxmint/mintUpload/services/service file. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxmint
Linuxmint mintupload |
|
| CPEs | cpe:2.3:a:linuxmint:mintupload:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxmint
Linuxmint mintupload |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:12.880Z
Reserved: 2024-05-19T00:00:00.000Z
Link: CVE-2024-36053
Updated: 2024-08-02T03:30:12.550Z
Status : Deferred
Published: 2024-05-19T16:15:45.687
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-36053
No data.
OpenCVE Enrichment
No data.
EUVD