Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/alphandbelt/CVE-2024-44542/tree/main |
|
Fri, 10 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:todesk:todesk:1.1:*:*:*:-:*:*:* |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 18 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 |
Wed, 18 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 |
Wed, 18 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Todesk
Todesk todesk |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:todesk:todesk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Todesk
Todesk todesk |
|
| Metrics |
cvssV3_1
|
Wed, 18 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL Injection vulnerability in todesk v.1.1 allows a remote attacker to execute arbitrary code via the /todesk.com/news.html parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-18T18:58:15.491Z
Reserved: 2024-08-21T00:00:00.000Z
Link: CVE-2024-44542
Updated: 2024-09-18T17:37:33.445Z
Status : Analyzed
Published: 2024-09-18T15:15:16.137
Modified: 2025-10-10T19:21:17.103
Link: CVE-2024-44542
No data.
OpenCVE Enrichment
No data.