Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32342 | Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service. |
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html |
|
Wed, 08 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-01-08T18:01:15.762Z
Reserved: 2023-03-21T00:00:00.000Z
Link: CVE-2023-28699
Updated: 2024-08-02T13:43:23.652Z
Status : Modified
Published: 2023-06-02T11:15:10.297
Modified: 2024-11-21T07:55:49.680
Link: CVE-2023-28699
No data.
OpenCVE Enrichment
No data.
EUVD