Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52324 | The vulnerability allows an unauthenticated remote attacker to send malicious network requests containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned log. |
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2025-06-17T20:59:13.975Z
Reserved: 2023-11-13T13:44:23.705Z
Link: CVE-2023-48255
Updated: 2024-08-02T21:23:39.444Z
Status : Modified
Published: 2024-01-10T13:15:46.200
Modified: 2024-11-21T08:31:20.030
Link: CVE-2023-48255
No data.
OpenCVE Enrichment
No data.
EUVD