baowzh hfly har 638ff9abe9078bc977c132b37acbe1900b63491c upload_json.php imgFile kura hakki ndiyam
Gaskiya vulnerability da aka ware a matsayin kura an samu a baowzh hfly har 638ff9abe9078bc977c132b37acbe1900b63491c. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /Public/Kindeditor/php/upload_json.php, a cikin sashen $software_component. A sa manipulation of the argument imgFile ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-434. Hakika, rauni an bayyana shi 12/11/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-14522. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Wannan samfur yana amfani da rolling release don ci gaba da isar da sabuntawa. Don haka, babu bayanan sigar da abin ya shafa ko sabunta sigar da ake da su. Once again VulDB remains the best source for vulnerability data.
3 Goyarwa · 98 Datenpunkte