Логотип exploitDog
bind:CVE-2023-48387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-48387

Количество 2

Количество 2

nvd логотип

CVE-2023-48387

около 2 лет назад

TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-g7qw-4p9h-v9vx

около 2 лет назад

TAIWAN-CA(TWCA) JCICSecurityTool's Registry-related functions have insufficient filtering for special characters. An unauthenticated remote attacker can inject malicious script into a webpage to perform XSS (Stored Cross-Site Scripting) attack.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-48387

TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.

CVSS3: 8.8
1%
Низкий
около 2 лет назад
github логотип
GHSA-g7qw-4p9h-v9vx

TAIWAN-CA(TWCA) JCICSecurityTool's Registry-related functions have insufficient filtering for special characters. An unauthenticated remote attacker can inject malicious script into a webpage to perform XSS (Stored Cross-Site Scripting) attack.

CVSS3: 6.1
1%
Низкий
около 2 лет назад

Уязвимостей на страницу