{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:19:15.312","vulnerabilities":[{"cve":{"id":"CVE-2024-46540","sourceIdentifier":"cve@mitre.org","published":"2024-09-30T17:15:04.550","lastModified":"2025-06-17T15:57:20.630","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges."},{"lang":"es","value":"Una vulnerabilidad de ejecución de código remoto (RCE) en el componente /admin/store.php de Emlog Pro anterior a v2.3.15 permite a los atacantes utilizar descargas de archivos remotas y funciones de autoextracción para cargar webshells al servidor de destino, obteniendo así privilegios del sistema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":5.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*","versionEndExcluding":"2.3.15","matchCriteriaId":"EE25D2F6-8025-4EC4-8418-6B9D14F7F341"}]}]}],"references":[{"url":"https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/emlog/emlog","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/microvorld/CVE-2024/blob/main/emlog.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}