arbitrary code execution.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25579 | User provided input is not sanitized in the “Settings > Access Control” configuration interface allowing for arbitrary code execution. |
Fri, 08 Nov 2024 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | User provided input is not sanitized in the “Settings > Access Control” configuration interface allowing for arbitrary code execution. | User provided input is not sanitized in the “Settings > Access Control” configuration interface allowing for arbitrary code execution. |
| Weaknesses | CWE-78 |
Thu, 17 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2024-11-08T08:29:24.001Z
Reserved: 2022-11-04T18:30:01.767Z
Link: CVE-2023-21411
Updated: 2024-08-02T09:36:34.454Z
Status : Modified
Published: 2023-08-03T07:15:13.003
Modified: 2024-11-21T07:42:48.547
Link: CVE-2023-21411
No data.
OpenCVE Enrichment
No data.
EUVD