Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jpcert
Jpcert logontracer |
|
| CPEs | cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jpcert
Jpcert logontracer |
Tue, 28 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in LogonTracer Prior to v2.0.0 Allows Arbitrary Command Execution by Authenticated User |
Mon, 27 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) logontracer |
|
| Vendors & Products |
Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) logontracer |
Mon, 27 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-04-27T15:32:02.563Z
Reserved: 2026-04-21T23:51:22.704Z
Link: CVE-2026-33277
Updated: 2026-04-27T15:31:58.190Z
Status : Analyzed
Published: 2026-04-27T00:16:19.483
Modified: 2026-04-28T18:43:10.593
Link: CVE-2026-33277
No data.
OpenCVE Enrichment
Updated: 2026-04-28T05:00:14Z