Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:weaver:e-cology:9.0:*:*:*:*:*:*:* |
Thu, 21 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weaver
Weaver e-cology |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Weaver
Weaver e-cology |
|
| Metrics |
cvssV3_1
|
Wed, 20 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file. | A vulnerability was found in Weaver E-cology allows attackers use race conditions to bypass security mechanisms to upload malicious files and control server privileges |
Tue, 19 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-21T16:32:21.047Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48069
Updated: 2024-11-21T16:28:11.478Z
Status : Analyzed
Published: 2024-11-19T18:15:21.257
Modified: 2025-06-05T13:54:55.510
Link: CVE-2024-48069
No data.
OpenCVE Enrichment
No data.