Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-3238

A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.5%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 6.5
Products affected by CVE-2023-3238
  • Otcms » Otcms » Version: 3.20
    cpe:2.3:a:otcms:otcms:3.20
  • Otcms » Otcms » Version: 3.61
    cpe:2.3:a:otcms:otcms:3.61
  • Otcms » Otcms » Version: 3.81
    cpe:2.3:a:otcms:otcms:3.81
  • Otcms » Otcms » Version: 3.85
    cpe:2.3:a:otcms:otcms:3.85
  • Otcms » Otcms » Version: 6.00
    cpe:2.3:a:otcms:otcms:6.00
  • Otcms » Otcms » Version: 6.01
    cpe:2.3:a:otcms:otcms:6.01
  • Otcms » Otcms » Version: 6.10
    cpe:2.3:a:otcms:otcms:6.10
  • Otcms » Otcms » Version: 6.11
    cpe:2.3:a:otcms:otcms:6.11
  • Otcms » Otcms » Version: 6.20
    cpe:2.3:a:otcms:otcms:6.20
  • Otcms » Otcms » Version: 6.21
    cpe:2.3:a:otcms:otcms:6.21
  • Otcms » Otcms » Version: 6.22
    cpe:2.3:a:otcms:otcms:6.22
  • Otcms » Otcms » Version: 6.23
    cpe:2.3:a:otcms:otcms:6.23
  • Otcms » Otcms » Version: 6.25
    cpe:2.3:a:otcms:otcms:6.25
  • Otcms » Otcms » Version: 6.30
    cpe:2.3:a:otcms:otcms:6.30
  • Otcms » Otcms » Version: 6.50
    cpe:2.3:a:otcms:otcms:6.50
  • Otcms » Otcms » Version: 6.60
    cpe:2.3:a:otcms:otcms:6.60
  • Otcms » Otcms » Version: 6.61
    cpe:2.3:a:otcms:otcms:6.61
  • Otcms » Otcms » Version: 6.62
    cpe:2.3:a:otcms:otcms:6.62


Contact Us

Shodan ® - All rights reserved