Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36029 | OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product. |
Fri, 14 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keisuke Nakayama
Keisuke Nakayama awkblog |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:keisuke_nakayama:awkblog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Keisuke Nakayama
Keisuke Nakayama awkblog |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-03-14T14:43:00.422Z
Reserved: 2024-05-24T02:04:55.207Z
Link: CVE-2024-36360
Updated: 2024-08-02T03:37:04.935Z
Status : Deferred
Published: 2024-06-11T05:15:53.610
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-36360
No data.
OpenCVE Enrichment
No data.
EUVD