Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
References
Link | Resource |
---|---|
https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md | Exploit Third Party Advisory |
https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory |
08 Jun 2023, 01:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-319 | |
CPE | cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:* | |
First Time |
Escanav
Escanav escan Management Console |
|
References | (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
31 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-31 20:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33730
Mitre link : CVE-2023-33730
CVE.ORG link : CVE-2023-33730
JSON object : View
Products Affected
escanav
- escan_management_console
CWE
CWE-319
Cleartext Transmission of Sensitive Information