Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-35525 | Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries |
| Link | Providers |
|---|---|
| https://checkmk.com/werk/16226 |
|
Mon, 02 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2024-12-02T14:29:06.806Z
Reserved: 2023-04-25T08:49:15.443Z
Link: CVE-2023-31210
Updated: 2024-08-02T14:53:29.719Z
Status : Modified
Published: 2023-12-13T09:15:34.080
Modified: 2024-11-21T08:01:37.843
Link: CVE-2023-31210
No data.
OpenCVE Enrichment
No data.
EUVD