CVE-2023-33730

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*

History

08 Jun 2023, 01:24

Type Values Removed Values Added
First Time Escanav escan Management Console
Escanav
References (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - (MISC) https://github.com/sahiloj/CVE-2023-33730/blob/main/CVE-2023-33730.md - Exploit, Third Party Advisory
CPE cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-319

31 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-31 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-33730

Mitre link : CVE-2023-33730

CVE.ORG link : CVE-2023-33730


JSON object : View

Products Affected

escanav

  • escan_management_console
CWE
CWE-319

Cleartext Transmission of Sensitive Information