Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-48248
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Bosch Nexo cordless nutrunner 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Bosch Nexo Cordless nutrunner是德国博世(Bosch)公司的一系列具有集成控制功能的无绳拧紧扳手。 Bosch Nexo cordless nutrunner 存在安全漏洞。该漏洞允许经过身份验证的远程攻击者将包含任意客户端脚本代码的恶意文件上传到 SD 卡,并通过精心设计的 URL、HTTP 请求或简单地等待受害者在受害者的会话中获取该文件的执行。查看中毒文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
RexrothNexo cordless nutrunner NXA015S-36V (0608842001) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA030S-36V (0608842002) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA050S-36V (0608842003) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXP012QD-36V (0608842005) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA015S-36V-B (0608842006) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA030S-36V-B (0608842007) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA050S-36V-B (0608842008) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXP012QD-36V-B (0608842010) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA011S-36V (0608842011) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA011S-36V-B (0608842012) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA065S-36V (0608842013) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXA065S-36V-B (0608842014) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXV012T-36V (0608842015) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo cordless nutrunner NXV012T-36V-B (0608842016) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2272) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2301) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2514) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2515) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2666) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
RexrothNexo special cordless nutrunner (0608PE2673) NEXO-OS V1000-Release ~ NEXO-OS V1500-SP2 -
II. Public POCs for CVE-2023-48248
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-48248
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-48248

No comments yet


Leave a comment