calesanz gibb-modul-151 bearbeiten/login Redirect

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin calesanz gibb-modul-151. Gaskiya, bearbeiten/login na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Redirect. CWE shidin ka a yi bayani matsala sai ya kai CWE-601. Gaskiya, laifi an fitar da shi 01/14/2023 a matsayin 88a517dc19443081210c804b655e72770727540d. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2015-10052. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ga. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Patch ɗin sunan ganowa shine 88a517dc19443081210c804b655e72770727540d. An tanadi gyaran matsalar don saukewa a github.com. Ana so a yi patch don gyara wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

6 Goyarwa · 98 Datenpunkte

FurɗeGargadi 1/5
02/07/2023 15:04
Gargadi 2/5
02/07/2023 15:06
Gargadi 3/5
02/07/2023 15:12
Gargadi 4/5
08/06/2024 11:40
Gargadi 5/5
04/28/2025 06:42
software_vendorcalesanzcalesanzcalesanzcalesanzcalesanz
software_namegibb-modul-151gibb-modul-151gibb-modul-151gibb-modul-151gibb-modul-151
software_functionbearbeiten/loginbearbeiten/loginbearbeiten/loginbearbeiten/loginbearbeiten/login
vulnerability_cweCWE-601 (Redirect)CWE-601 (Redirect)CWE-601 (Redirect)CWE-601 (Redirect)CWE-601 (Redirect)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d
advisory_urlhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d
countermeasure_nameKariKariKariKariKari
patch_name88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d88a517dc19443081210c804b655e72770727540d
countermeasure_patch_urlhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540dhttps://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d
countermeasure_advisoryquotefixed security vulnerability in redirect (missing validation)fixed security vulnerability in redirect (missing validation)fixed security vulnerability in redirect (missing validation)fixed security vulnerability in redirect (missing validation)fixed security vulnerability in redirect (missing validation)
source_cveCVE-2015-10052CVE-2015-10052CVE-2015-10052CVE-2015-10052CVE-2015-10052
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cna_eol11111
advisory_date1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_auSSSSS
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore5.55.55.55.55.5
cvss2_vuldb_tempscore4.84.84.84.84.8
cvss3_vuldb_basescore4.64.64.64.64.6
cvss3_vuldb_tempscore4.44.44.44.44.4
cvss3_meta_basescore4.65.15.15.15.1
cvss3_meta_tempscore4.45.05.05.05.0
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_assigned1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)
cve_nvd_summary** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
cvss3_nvd_avNNNN
cvss3_nvd_acLLLL
cvss3_nvd_prNNNN
cvss3_nvd_uiRRRR
cvss3_nvd_sCCCC
cvss3_nvd_cLLLL
cvss3_nvd_iLLLL
cvss3_nvd_aNNNN
cvss2_nvd_avNNNN
cvss2_nvd_acLLLL
cvss2_nvd_auSSSS
cvss2_nvd_ciNNNN
cvss2_nvd_iiPPPP
cvss2_nvd_aiPPPP
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiRRRR
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cve_cnaVulDBVulDBVulDBVulDB
cvss2_nvd_basescore5.55.55.55.5
cvss3_nvd_basescore6.16.16.16.1
cvss3_cna_basescore4.64.64.64.6
cve_nvd_summaryes** NO SOPORTADO CUANDO ESTÁ ASIGNADO ** Una vulnerabilidad clasificada como problemática fue encontrada en calesanz gibb-modul-151. Esto afecta a la función Bearbeiten/login. La manipulación conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante.** NO SOPORTADO CUANDO ESTÁ ASIGNADO ** Una vulnerabilidad clasificada como problemática fue encontrada en calesanz gibb-modul-151. Esto afecta a la función Bearbeiten/login. La manipulación conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante.
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciNN
cvss2_cna_iiPP
cvss2_cna_aiPP
cvss2_cna_basescore5.55.5
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prLL
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_eXX
cvss4_vuldb_atNN
cvss4_vuldb_uiNP
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss4_vuldb_bscore5.35.1
cvss4_vuldb_btscore5.35.1

Do you need the next level of professionalism?

Upgrade your account now!