Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meowapps
Meowapps ai Engine |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Meowapps
Meowapps ai Engine |
Mon, 19 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ai Engine Project
Ai Engine Project ai Engine |
|
| CPEs | cpe:2.3:a:ai_engine_project:ai_engine:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ai Engine Project
Ai Engine Project ai Engine |
|
| Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AI Engine < 2.4.3 is susceptible to remote-code-execution (RCE) via Log Poisoning. The AI Engine WordPress plugin before 2.5.1 fails to validate the file extension of "logs_path", allowing Administrators to change log filetypes from .log to .php. | |
| Title | AI Engine < 2.5.1 - Admin+ RCE | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-19T17:10:21.720Z
Reserved: 2024-07-02T12:30:32.746Z
Link: CVE-2024-6451
Updated: 2024-08-19T17:10:12.989Z
Status : Analyzed
Published: 2024-08-19T06:15:05.880
Modified: 2025-05-27T21:05:27.360
Link: CVE-2024-6451
No data.
OpenCVE Enrichment
No data.