Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.32352}

epss

{'score': 0.2551}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-15T19:46:01.384Z

Reserved: 2024-01-25T00:00:00.000Z

Link: CVE-2024-24398

cve-icon Vulnrichment

Updated: 2024-08-01T23:19:52.617Z

cve-icon NVD

Status : Modified

Published: 2024-02-06T00:15:08.183

Modified: 2025-05-15T20:15:46.310

Link: CVE-2024-24398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.