Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-39846 | In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section. |
Wed, 11 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-11T17:04:00.808Z
Reserved: 2023-06-19T00:00:00.000Z
Link: CVE-2023-35853
Updated: 2024-08-02T16:30:45.383Z
Status : Modified
Published: 2023-06-19T04:15:11.287
Modified: 2024-12-11T17:15:13.037
Link: CVE-2023-35853
No data.
OpenCVE Enrichment
No data.
EUVD