zerochplus thread.res.pl PrintResList Cross Site Scripting
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin zerochplus. Gaskiya, PrintResList na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, test/mordor/thread.res.pl na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi 01/11/2023 a matsayin 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2013-10010. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ga. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Patch ɗin sunan ganowa shine 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. An tanadi gyaran matsalar don saukewa a github.com. Ana so a yi patch don gyara wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
3 Goyarwa · 71 Datenpunkte