Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution via File Upload in fohrloop Dash-Uploader | |
| Weaknesses | CWE-78 CWE-94 |
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 CWE-670 |
|
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution via File Upload in fohrloop Dash-Uploader | |
| Weaknesses | CWE-78 CWE-94 |
Fri, 08 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload function and max_file_size parameter, dash_uploader/configure_upload.py components | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T18:27:31.102Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38361
Updated: 2026-05-08T18:26:05.370Z
Status : Undergoing Analysis
Published: 2026-05-08T15:16:37.120
Modified: 2026-05-08T19:16:31.103
Link: CVE-2026-38361
No data.
OpenCVE Enrichment
Updated: 2026-05-08T22:30:18Z