Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32653 | The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known. |
Thu, 17 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-04-17T18:09:04.675Z
Reserved: 2023-03-30T09:34:25.189Z
Link: CVE-2023-29049
Updated: 2024-08-02T14:00:14.708Z
Status : Modified
Published: 2024-01-08T09:15:20.120
Modified: 2024-11-21T07:56:26.957
Link: CVE-2023-29049
No data.
OpenCVE Enrichment
No data.
EUVD