Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-46122 | A lack of input sanitizing in the file download feature of eSST Monitoring v2.147.1 allows attackers to execute a path traversal. |
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-34 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T15:09:47.159Z
Reserved: 2023-08-30T00:00:00.000Z
Link: CVE-2023-41629
Updated: 2024-08-02T19:01:35.269Z
Status : Modified
Published: 2023-10-17T22:15:17.057
Modified: 2024-11-21T08:21:23.140
Link: CVE-2023-41629
No data.
OpenCVE Enrichment
No data.
EUVD