Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58396 | Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim. |
Mon, 19 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim. | Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim. |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-05-19T13:54:39.840Z
Reserved: 2023-11-14T23:06:49.462Z
Link: CVE-2023-6142
No data.
Status : Modified
Published: 2023-11-21T00:15:07.160
Modified: 2025-05-19T14:15:21.667
Link: CVE-2023-6142
No data.
OpenCVE Enrichment
No data.
EUVD