Description
Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/Gelcon/PoC-of-Hodoku-V2.3.0-RCE |
|
History
Wed, 11 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Tue, 03 Dec 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-11T14:39:22.544Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51363
Updated: 2024-12-11T14:39:17.529Z
Status : Deferred
Published: 2024-12-03T22:15:05.013
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-51363
No data.
OpenCVE Enrichment
No data.
Weaknesses