what3words Autosuggest Plugin har 4.0.0 ka WordPress Setting class-w3w-autosuggest-public.php enqueue_scripts Bayani fitowa
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a what3words Autosuggest Plugin har 4.0.0 on WordPress. Hakika, aikin enqueue_scripts ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil w3w-autosuggest/public/class-w3w-autosuggest-public.php, a cikin sashen Setting Handler. A sa manipulation ka Bayani fitowa. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-200. Hakika, rauni an bayyana shi 11/17/2021 kamar dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2021-4428. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Babu exploit ɗin da ake samu. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. An tanadi gyaran matsalar don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
3 Goyarwa · 79 Datenpunkte