tombh jekbox lib/server.rb Bayani fitowa

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a tombh jekbox. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil lib/server.rb, a cikin sashi $software_component. Wuro manipulation ga Bayani fitowa. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-548. Lalle, rauni an sanar da shi 01/14/2023 da 64eb2677671018fc08b96718b81e3dbc83693190. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2016-15019. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $0-$5k. Patch ɗin an san shi da 64eb2677671018fc08b96718b81e3dbc83693190. An tanadi gyaran matsalar don saukewa a github.com. Ya kamata a yi amfani da patch don magance wannan matsala. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 Goyarwa · 71 Datenpunkte

FurɗeSúgá
01/14/2023 18:16
Gargadi 1/2
02/07/2023 14:45
Gargadi 2/2
02/07/2023 14:46
software_vendortombhtombhtombh
software_namejekboxjekboxjekbox
software_filelib/server.rblib/server.rblib/server.rb
vulnerability_cweCWE-548 (Bayani fitowa)CWE-548 (Bayani fitowa)CWE-548 (Bayani fitowa)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iNNN
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier64eb2677671018fc08b96718b81e3dbc8369319064eb2677671018fc08b96718b81e3dbc8369319064eb2677671018fc08b96718b81e3dbc83693190
advisory_urlhttps://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190https://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190https://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190
countermeasure_nameKariKariKari
patch_name64eb2677671018fc08b96718b81e3dbc8369319064eb2677671018fc08b96718b81e3dbc8369319064eb2677671018fc08b96718b81e3dbc83693190
countermeasure_patch_urlhttps://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190https://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190https://github.com/tombh/jekbox/commit/64eb2677671018fc08b96718b81e3dbc83693190
countermeasure_advisoryquoteEnsure that requests ending with a slash and without try looking for an index.html file. And prevent malicious directory traversingEnsure that requests ending with a slash and without try looking for an index.html file. And prevent malicious directory traversingEnsure that requests ending with a slash and without try looking for an index.html file. And prevent malicious directory traversing
source_cveCVE-2016-15019CVE-2016-15019CVE-2016-15019
cna_responsibleVulDBVulDBVulDB
advisory_date1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiNNN
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_eXXX
cvss2_vuldb_basescore4.04.04.0
cvss2_vuldb_tempscore3.53.53.5
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore4.14.14.1
cvss3_meta_basescore4.34.35.4
cvss3_meta_tempscore4.14.15.3
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1673650800 (01/14/2023)1673650800 (01/14/2023)
cve_nvd_summaryA vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The name of the patch is 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375.A vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The name of the patch is 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375.
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iN
cvss3_nvd_aN
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiN
cvss2_nvd_aiN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cve_cnaVulDB
cvss2_nvd_basescore4.0
cvss3_nvd_basescore7.5
cvss3_cna_basescore4.3
cvss3_nvd_avN

Do you want to use VulDB in your project?

Use the official API to access entries easily!