Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33302 | An issue was discovered in Nokia NetAct 22 through the Site Configuration Tool website section. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used. |
Thu, 24 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-24T15:02:43.087Z
Reserved: 2022-04-08T00:00:00.000Z
Link: CVE-2022-28865
Updated: 2024-08-03T06:03:53.146Z
Status : Modified
Published: 2023-07-24T14:15:10.157
Modified: 2024-11-21T06:58:05.453
Link: CVE-2022-28865
No data.
OpenCVE Enrichment
No data.
EUVD