Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52316 | The vulnerability allows an unauthenticated remote attacker to read arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request. |
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2025-06-17T20:59:12.865Z
Reserved: 2023-11-13T13:44:23.702Z
Link: CVE-2023-48247
Updated: 2024-08-02T21:23:39.100Z
Status : Modified
Published: 2024-01-10T11:15:09.647
Modified: 2024-11-21T08:31:18.150
Link: CVE-2023-48247
No data.
OpenCVE Enrichment
No data.
EUVD