Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gestioip
Gestioip gestioip |
|
| CPEs | cpe:2.3:a:gestioip:gestioip:3.5.7:*:*:*:*:*:*:* | |
| Vendors & Products |
Gestioip
Gestioip gestioip |
Thu, 23 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Tue, 14 Jan 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in GestiolP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution. | An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution. |
Tue, 14 Jan 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in GestiolP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-23T16:30:45.362Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48760
Updated: 2025-01-23T16:30:29.886Z
Status : Analyzed
Published: 2025-01-14T22:15:26.963
Modified: 2025-06-06T15:40:58.640
Link: CVE-2024-48760
No data.
OpenCVE Enrichment
No data.