moappi Json2html har 1.1.x json2html.js Cross Site Scripting

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a moappi Json2html har 1.1.x. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil json2html.js, a cikin sashi $software_component. Wuro manipulation ga Cross Site Scripting. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-79. Lalle, rauni an sanar da shi 12/28/2022 da 2d3d24d971b19a8ed1fb823596300b9835d55801. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2018-25053. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $0-$5k. Patch ɗin an san shi da 2d3d24d971b19a8ed1fb823596300b9835d55801. An tanadi gyaran matsalar don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 Goyarwa · 66 Datenpunkte

FurɗeSúgá
12/28/2022 12:26
Gargadi 1/2
01/25/2023 16:00
Gargadi 2/2
01/25/2023 16:05
software_vendormoappimoappimoappi
software_nameJson2htmlJson2htmlJson2html
software_version<=1.1.x<=1.1.x<=1.1.x
software_filejson2html.jsjson2html.jsjson2html.js
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier2d3d24d971b19a8ed1fb823596300b9835d558012d3d24d971b19a8ed1fb823596300b9835d558012d3d24d971b19a8ed1fb823596300b9835d55801
advisory_urlhttps://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801
countermeasure_nameGargajiyaGargajiyaGargajiya
upgrade_version1.2.01.2.01.2.0
countermeasure_upgrade_urlhttps://github.com/moappi/json2html/releases/tag/1.2.0https://github.com/moappi/json2html/releases/tag/1.2.0https://github.com/moappi/json2html/releases/tag/1.2.0
patch_name2d3d24d971b19a8ed1fb823596300b9835d558012d3d24d971b19a8ed1fb823596300b9835d558012d3d24d971b19a8ed1fb823596300b9835d55801
countermeasure_patch_urlhttps://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801
source_cveCVE-2018-25053CVE-2018-25053CVE-2018-25053
cna_responsibleVulDBVulDBVulDB
advisory_date1672182000 (12/28/2022)1672182000 (12/28/2022)1672182000 (12/28/2022)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.44.44.4
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore4.14.14.1
cvss3_meta_basescore4.34.34.9
cvss3_meta_tempscore4.14.14.8
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1672182000 (12/28/2022)1672182000 (12/28/2022)
cve_nvd_summaryA vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959.A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss3_nvd_basescore6.1
cvss3_cna_basescore4.3

Might our Artificial Intelligence support you?

Check our Alexa App!