Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48520 | Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-4084 |
|
Mon, 23 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2024-09-23T18:07:11.537Z
Reserved: 2023-09-26T13:09:58.803Z
Link: CVE-2023-44161
Updated: 2024-08-02T19:59:50.802Z
Status : Modified
Published: 2023-09-27T15:19:38.323
Modified: 2024-11-21T08:25:20.857
Link: CVE-2023-44161
No data.
OpenCVE Enrichment
No data.
EUVD