CVE-2023-33730

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*

History

08 Jun 2023, 01:24

Type Values Removed Values Added
CWE CWE-319
CPE cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Escanav
Escanav escan Management Console
References (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory

31 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-31 20:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-33730

Mitre link : CVE-2023-33730

CVE.ORG link : CVE-2023-33730


JSON object : View

Products Affected

escanav

  • escan_management_console
CWE
CWE-319

Cleartext Transmission of Sensitive Information