{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T01:38:23.765","vulnerabilities":[{"cve":{"id":"CVE-2024-34833","sourceIdentifier":"cve@mitre.org","published":"2024-06-17T21:15:50.783","lastModified":"2025-04-30T16:21:23.247","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the \"save_settings\" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server."},{"lang":"es","value":"Sourcecodester Payroll Management System v1.0 es vulnerable a la carga de archivos. Los usuarios pueden cargar imágenes a través de la página \"save_settings\". Un atacante no autenticado puede aprovechar esta funcionalidad para cargar un archivo PHP malicioso. La explotación exitosa de esta vulnerabilidad da como resultado la capacidad de ejecutar código arbitrario como usuario que ejecuta el servidor web."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oretnom23:payroll_management_system:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F0EFA34C-8127-4DE7-BBB7-7D5C8C1EDC32"}]}]}],"references":[{"url":"https://github.com/ShellUnease/payroll-management-system-rce","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://github.com/ShellUnease/payroll-management-system-rce","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}