Metrics
Affected Vendors & Products
Wed, 06 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Thinkadmin
Thinkadmin thinkadmin |
|
CPEs | cpe:2.3:a:thinkadmin:thinkadmin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Thinkadmin
Thinkadmin thinkadmin |
Mon, 04 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Nov 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | ThinkAdmin Plugs.php script deserialization | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-11-04T00:31:06.125Z
Updated: 2024-11-04T18:07:12.797Z
Reserved: 2024-11-03T06:20:08.147Z
Link: CVE-2024-10749
Updated: 2024-11-04T18:07:09.343Z
Status : Analyzed
Published: 2024-11-04T01:15:03.470
Modified: 2024-11-06T15:04:49.497
Link: CVE-2024-10749
No data.