Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-48387
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TAIWAN-CA(TWCA) JCICSecurityTool - Improper Input Validation
Source: NVD (National Vulnerability Database)
Vulnerability Description
TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
通信信道源的不正确验证
Source: NVD (National Vulnerability Database)
Vulnerability Title
TAIWAN-CA(TWCA) JCICSecurityTool 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TAIWAN-CA(TWCA) JCICSecurityTool是台湾网路认证(TWCA)公司的一款应用软件。 TAIWAN-CA(TWCA) JCICSecurityTool v4.2.3.32版本存在跨站脚本漏洞,该漏洞源于注册表相关函数对特殊字符的过滤不足,远程攻击者利用该漏洞可以将恶意脚本注入网页以执行跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
TAIWAN-CA(TWCA)JCICSecurityTool 4.2.3.32 -
II. Public POCs for CVE-2023-48387
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-48387
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-48387

No comments yet


Leave a comment