O2OA har 10.0-410 Personal Profile Page unit Cross Site Scripting

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin O2OA har 10.0-410. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /x_organization_assemble_control/jaxrs/unit/ na cikin fayil, Personal Profile Page na cikin sashi. Ngam manipulation of the argument name/shortName/distinguishedName/pinyin/pinyinInitial/levelName shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi 08/30/2025 a matsayin 183. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-9717. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

4 Goyarwa · 98 Datenpunkte

FurɗeSúgá
08/30/2025 13:10
Gargadi 1/3
08/31/2025 09:47
Gargadi 2/3
08/31/2025 10:46
Gargadi 3/3
09/10/2025 01:50
software_nameO2OAO2OAO2OAO2OA
software_version<=10.0-410<=10.0-410<=10.0-410<=10.0-410
software_componentPersonal Profile PagePersonal Profile PagePersonal Profile PagePersonal Profile Page
software_file/x_organization_assemble_control/jaxrs/unit//x_organization_assemble_control/jaxrs/unit//x_organization_assemble_control/jaxrs/unit//x_organization_assemble_control/jaxrs/unit/
software_argumentname/shortName/distinguishedName/pinyin/pinyinInitial/levelNamename/shortName/distinguishedName/pinyin/pinyinInitial/levelNamename/shortName/distinguishedName/pinyin/pinyinInitial/levelNamename/shortName/distinguishedName/pinyin/pinyinInitial/levelName
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_identifier183183183183
advisory_urlhttps://github.com/o2oa/o2oa/issues/183https://github.com/o2oa/o2oa/issues/183https://github.com/o2oa/o2oa/issues/183https://github.com/o2oa/o2oa/issues/183
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/o2oa/o2oa/issues/183#issue-3332973239https://github.com/o2oa/o2oa/issues/183#issue-3332973239https://github.com/o2oa/o2oa/issues/183#issue-3332973239https://github.com/o2oa/o2oa/issues/183#issue-3332973239
source_cveCVE-2025-9717CVE-2025-9717CVE-2025-9717CVE-2025-9717
cna_responsibleVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prLLLL
cvss4_vuldb_uiPPPP
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.2
cvss3_meta_basescore3.53.53.54.1
cvss3_meta_tempscore3.23.23.34.0
cvss4_vuldb_bscore5.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.0
advisory_date1756504800 (08/30/2025)1756504800 (08/30/2025)1756504800 (08/30/2025)1756504800 (08/30/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-26284EUVD-2025-26284EUVD-2025-26284
cve_nvd_summaryA vulnerability was identified in O2OA up to 10.0-410. Affected by this issue is some unknown functionality of the file /x_organization_assemble_control/jaxrs/unit/ of the component Personal Profile Page. Such manipulation of the argument name/shortName/distinguishedName/pinyin/pinyinInitial/levelName leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used.A vulnerability was identified in O2OA up to 10.0-410. Affected by this issue is some unknown functionality of the file /x_organization_assemble_control/jaxrs/unit/ of the component Personal Profile Page. Such manipulation of the argument name/shortName/distinguishedName/pinyin/pinyinInitial/levelName leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prLL
cvss4_cna_uiPP
cvss4_cna_vcNN
cvss4_cna_viLL
cvss4_cna_vaNN
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore5.15.1
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iLL
cvss3_cna_aNN
cvss3_cna_basescore3.53.5
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciNN
cvss2_cna_iiPP
cvss2_cna_aiNN
cvss2_cna_basescore44
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4

Might our Artificial Intelligence support you?

Check our Alexa App!