Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34270 | A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected. |
Mon, 30 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Proofpoint
Published:
Updated: 2024-12-30T14:55:42.337Z
Reserved: 2023-05-19T21:05:55.711Z
Link: CVE-2023-2819
Updated: 2024-08-02T06:33:05.790Z
Status : Modified
Published: 2023-06-14T22:15:09.203
Modified: 2024-11-21T07:59:21.110
Link: CVE-2023-2819
No data.
OpenCVE Enrichment
No data.
EUVD