Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4488 | An issue in the shiroFilter function of White-Jotter project v0.2.2 allows attackers to execute a directory traversal and access sensitive endpoints via a crafted URL. |
| Link | Providers |
|---|---|
| https://github.com/DYX217/Incorrect-Access-Control |
|
Thu, 21 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Antabot
Antabot white-jotter |
|
| CPEs | cpe:2.3:a:antabot:white-jotter:0.2.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Antabot
Antabot white-jotter |
Mon, 17 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-437 | |
| Metrics |
cvssV3_1
|
Fri, 21 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the shiroFilter function of White-Jotter project v0.2.2 allows attackers to execute a directory traversal and access sensitive endpoints via a crafted URL. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-17T18:38:05.699Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57176
Updated: 2025-02-24T17:36:13.482Z
Status : Analyzed
Published: 2025-02-21T18:15:18.877
Modified: 2025-08-21T21:51:51.697
Link: CVE-2024-57176
No data.
OpenCVE Enrichment
No data.
EUVD