Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51281

EPSS 0.23% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-51281

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cross Site Scripting vulnerability in Customer Support System v.1.0 allows a remote attacker to escalate privileges via a crafted script firstname, "lastname", "middlename", "contact" and address parameters.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Customer Support System 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Customer Support System是oretnom23个人开发者的一个客户支持系统,可以帮助某个企业或公司在客户从他们那里购买产品后提供客户支持。 Customer Support System v.1.0版本存在安全漏洞。攻击者利用该漏洞通过特制的脚本名字、“firstname”、“lastname”、“middlename”、“contact”和“address”参数来升级权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-51281

#POC DescriptionSource LinkShenlong Link
1Multiple cross-site scripting (XSS) vulnerabilities in /customer_support/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, "lastname", "middlename", "contact" or “address” parameters.https://github.com/geraldoalcantara/CVE-2023-51281POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-51281

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-03-07 · 29 CVEs total

CVE-2024-282229.8 CRITICALVeritas NetBackup 安全漏洞
CVE-2024-222564.3 MEDIUMVMware Cloud Director 信息泄露漏洞
CVE-2022-46498Hospital Management System 安全漏洞
CVE-2024-25729ARRIS SURFboard SBG6580 安全漏洞
CVE-2024-25327Justice Systems FullCourt Enterprise 安全漏洞
CVE-2024-27707Huly Platform 安全漏洞
CVE-2024-26492Online Diagnostic Lab Management System 安全漏洞
CVE-2024-24035Setor Informatica SIL 安全漏洞
CVE-2024-27733Beijing Baichuo Smart S42 安全漏洞
CVE-2024-22752EaseUS MobiMover 安全漏洞
CVE-2023-41503Student Enrollment In PHP 安全漏洞
CVE-2023-41015Online Job Portal 安全漏洞
CVE-2023-41014Online Job Portal 安全漏洞
CVE-2023-33676Lost and Found Information System 安全漏洞
CVE-2022-46499Hospital Management System 安全漏洞
CVE-2023-47415Cypress Solutions CTM-200 安全漏洞
CVE-2022-46497Hospital Management System 安全漏洞
CVE-2022-46091Online Flight Booking Management System 安全漏洞
CVE-2024-24389XunRuiCMS 安全漏洞
CVE-2022-46089Online Flight Booking Management System 安全漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-51281

No comments yet


Leave a comment