Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2682 | In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability. |
Github GHSA |
GHSA-738q-mc72-2q22 | MTProto proxy remote code execution vulnerability |
Wed, 18 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-18T19:49:40.475Z
Reserved: 2023-10-06T00:00:00.000Z
Link: CVE-2023-45312
Updated: 2024-08-02T20:21:15.651Z
Status : Modified
Published: 2023-10-10T21:15:09.680
Modified: 2024-11-21T08:26:43.537
Link: CVE-2023-45312
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA