Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48515 | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-5124 |
|
Mon, 23 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 |
Tue, 10 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-359 |
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2024-09-23T18:06:33.949Z
Reserved: 2023-09-26T13:09:58.803Z
Link: CVE-2023-44156
Updated: 2024-08-02T19:59:50.994Z
Status : Modified
Published: 2023-09-27T15:19:37.817
Modified: 2024-11-21T08:25:20.200
Link: CVE-2023-44156
No data.
OpenCVE Enrichment
No data.
EUVD