1 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function. Vulnerabilidad de Directory Traversal en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar código arbitrario a través de un payload manipulado en el parámetro fileName de la función Guardar. • https://github.com/trustcves/CVE-2024-24398 http://stimulsoft.com https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R https://cves.at/posts/cve-2024-24398/writeup • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •