Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://herolab.usd.de/security-advisories/usd-2024-0008/ |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webswing:webswing:23.2.2:*:*:*:-:*:*:* |
Fri, 01 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webswing
Webswing webswing |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:webswing:webswing:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Webswing
Webswing webswing |
|
| Metrics |
cvssV3_1
|
Thu, 31 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-01T15:34:47.969Z
Reserved: 2024-06-23T00:00:00
Link: CVE-2024-39332
Updated: 2024-11-01T15:34:43.371Z
Status : Analyzed
Published: 2024-10-31T19:15:12.897
Modified: 2025-07-10T19:35:36.567
Link: CVE-2024-39332
No data.
OpenCVE Enrichment
No data.