Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-40143
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Westermo Lynx
Source: NVD (National Vulnerability Database)
Vulnerability Description
An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Westermo Lynx 206-F2G 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Westermo Lynx 206-F2G是瑞典威斯特摩(Westermo)公司的一款三层工业以太网交换机,由 Westermo WeOS 网络操作系统提供支持。 Westermo Lynx 206-F2G存在安全漏洞。攻击者利用该漏洞可以通过将跨站点脚本有效载荷注入“forward.0.domain”参数来引入任意 JavaScript。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
WestermoLynx L206-F2G1 -
II. Public POCs for CVE-2023-40143
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-40143
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-40143

No comments yet


Leave a comment