CVE-2023-33730

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
References () https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory () https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory

08 Jun 2023, 01:24

Type Values Removed Values Added
CWE CWE-319
CPE cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*
First Time Escanav
Escanav escan Management Console
References (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

31 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-31 20:15

Updated : 2024-11-21 08:05


NVD link : CVE-2023-33730

Mitre link : CVE-2023-33730

CVE.ORG link : CVE-2023-33730


JSON object : View

Products Affected

escanav

  • escan_management_console
CWE
CWE-319

Cleartext Transmission of Sensitive Information