Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43914 | A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability. |
Thu, 02 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-01-02T20:40:18.187Z
Reserved: 2023-06-14T06:12:36.410Z
Link: CVE-2023-3238
Updated: 2024-08-02T06:48:08.194Z
Status : Modified
Published: 2023-06-14T08:15:09.713
Modified: 2024-11-21T08:16:46.277
Link: CVE-2023-3238
No data.
OpenCVE Enrichment
No data.
EUVD