Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 19 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zzcms
Zzcms zzcms |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zzcms
Zzcms zzcms |
|
| Metrics |
cvssV3_1
|
Fri, 16 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary file deletion vulnerability exists in the admin/del.php file at line 62 in ZZCMS 2023 and earlier. Due to insufficient validation and sanitization of user input for file paths, an attacker can exploit this vulnerability by using directory traversal techniques to delete arbitrary files on the server. This can lead to the deletion of critical files, potentially disrupting the normal operation of the system. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-19T14:02:35.099Z
Reserved: 2024-08-05T00:00:00
Link: CVE-2024-43011
Updated: 2024-08-19T14:02:03.474Z
Status : Analyzed
Published: 2024-08-16T20:15:13.497
Modified: 2025-04-21T14:57:21.247
Link: CVE-2024-43011
No data.
OpenCVE Enrichment
No data.