Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 17 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Emlog
Emlog emlog |
|
| CPEs | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
| Vendors & Products |
Emlog
Emlog emlog |
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Emlog Pro Project
Emlog Pro Project emlog Pro |
|
| Weaknesses | CWE-266 | |
| CPEs | cpe:2.3:a:emlog_pro_project:emlog_pro:1.0.4:*:*:*:*:*:*:* | |
| Vendors & Products |
Emlog Pro Project
Emlog Pro Project emlog Pro |
|
| Metrics |
cvssV3_1
|
Mon, 30 Sep 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-30T17:52:07.726Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-46540
Updated: 2024-09-30T17:49:19.530Z
Status : Analyzed
Published: 2024-09-30T17:15:04.550
Modified: 2025-06-17T15:57:20.630
Link: CVE-2024-46540
No data.
OpenCVE Enrichment
No data.