-
Notifications
You must be signed in to change notification settings - Fork 17
/
Copy pathCVE-2024-41454.json
25 lines (25 loc) · 1003 Bytes
/
CVE-2024-41454.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
{
"id": "CVE-2024-41454",
"sourceIdentifier": "[email protected]",
"published": "2025-01-15T23:15:09.130",
"lastModified": "2025-01-15T23:15:09.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the UI login page logo upload function of Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary code via uploading a crafted PHP or HTML file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga del logotipo de la p\u00e1gina de inicio de sesi\u00f3n de la interfaz de usuario de Process Maker pm4core-docker 4.1.21-RC7 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo PHP o HTML manipulado."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/php-lover-boy/processmaker",
"source": "[email protected]"
}
]
}