Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-22425 | Due to insufficient server-side validation, a successful exploit of this vulnerability could allow an attacker to gain access to certain URLs that the attacker should not have access to. |
Thu, 27 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: hikvision
Published:
Updated: 2025-03-27T15:19:11.168Z
Reserved: 2024-02-04T07:19:37.207Z
Link: CVE-2024-25063
Updated: 2024-08-01T23:36:21.275Z
Status : Modified
Published: 2024-03-02T03:15:06.007
Modified: 2025-03-27T16:15:22.760
Link: CVE-2024-25063
No data.
OpenCVE Enrichment
No data.
EUVD