A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.
References
Link | Resource |
---|---|
https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md | Exploit Third Party Advisory |
https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md - Exploit, Third Party Advisory |
03 Jul 2023, 19:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
First Time |
Escanav
Escanav escan Management Console |
|
CWE | CWE-79 | |
CPE | cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:* |
27 Jun 2023, 18:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-27 18:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-34838
Mitre link : CVE-2023-34838
CVE.ORG link : CVE-2023-34838
JSON object : View
Products Affected
escanav
- escan_management_console
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')