ShuiZe_0x727 v1.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /iniFile/config.ini.
References
Link | Resource |
---|---|
https://github.com/0x727/ShuiZe_0x727 | Product |
https://github.com/0x727/ShuiZe_0x727/issues/160 | Exploit Issue Tracking Third Party Advisory |
https://github.com/0x727/ShuiZe_0x727 | Product |
https://github.com/0x727/ShuiZe_0x727/issues/160 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/0x727/ShuiZe_0x727 - Product | |
References | () https://github.com/0x727/ShuiZe_0x727/issues/160 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2023-08-05 02:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38943
Mitre link : CVE-2023-38943
CVE.ORG link : CVE-2023-38943
JSON object : View
Products Affected
shuize_0x727_project
- shuize_0x727
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')