Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 31 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Operately
Operately operately |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:operately:operately:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Operately
Operately operately |
|
| Metrics |
cvssV3_1
|
Wed, 30 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unrestricted File Upload in the Discussions tab in Operately v.0.1.0 allows a privileged user to achieve Remote Code Execution via uploading and executing malicious files without validating file extensions or content types. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-31T14:24:51.128Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48093
Updated: 2024-10-31T14:23:52.656Z
Status : Deferred
Published: 2024-10-30T21:15:14.337
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-48093
No data.
OpenCVE Enrichment
No data.