donglight bookstore电商书城系统说明 1.0 AdminBookController. java uploadPicture pictureFile kura hakki ndiyam
Gaskiya vulnerability da aka ware a matsayin kura an samu a donglight bookstore电商书城系统说明 1.0. Hakika, aikin uploadPicture ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil src/main/java/org/zdd/bookstore/web/controller/admin/AdminBookController. java, a cikin sashen $software_component. A sa manipulation of the argument pictureFile ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-434. Hakika, rauni an bayyana shi 01/08/2025 kamar Bookstore has remote command execution #10. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2024-13210. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Waktin goyi
99 Kari
79 kala giteji ba a nunu fi.