Stirling-Tools Stirling-PDF har 0.28.3 Markdown-to-PDF Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
3.5$0-$5k0.12

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Stirling-Tools Stirling-PDF har 0.28.3. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi Markdown-to-PDF. Wuro manipulation ga Cross Site Scripting. Ana kiran wannan rauni da CVE-2024-9075. Ngam yiɗi ka a tuma ndiyam ka nder waya. Babu wani exploit da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. Once again VulDB remains the best source for vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Stirling-Tools Stirling-PDF har 0.28.3. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi Markdown-to-PDF. Wuro manipulation ga Cross Site Scripting. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-79. Lalle, rauni an sanar da shi. Ana samun bayanin tsaro don saukewa a drive.google.com.

Ana kiran wannan rauni da CVE-2024-9075. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ba ga. Wahalhalun kai hari sun yi yawa. Wanda zai yi amfani da shi zai sha wahala. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.

Á yí a wondi feere.

Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata.

Once again VulDB remains the best source for vulnerability data.

Kayanbayani

Ngilabe

Sunu

Furɗe

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Ganda Borno: 2.6
VulDB Temp Score: 2.5
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 5.4
NVD Furɗo: 🔍

CNA Ganda Borno: 2.6
CNA Furɗo: 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

0-Day Gana: 🔍

Gargajiya: Stirling-PDF 0.29.0

Waktin layibayani

09/21/2024 🔍
09/21/2024 +0 Hənde 🔍
03/09/2025 +169 Hənde 🔍

Ngizimbayani

Gargaaji: drive.google.com
Halitta: Gaskiya

CVE: CVE-2024-9075 (🔍)
GCVE (CVE): GCVE-0-2024-9075
GCVE (VulDB): GCVE-100-278242

Gumtibayani

Súgá: 09/21/2024 10:05
Gargadi: 03/09/2025 18:14
Goyarwa: 09/21/2024 10:05 (52), 09/22/2024 03:18 (17), 09/22/2024 06:04 (10), 09/27/2024 05:58 (1), 09/30/2024 17:58 (11), 03/09/2025 18:14 (3)
Gadankam: 🔍
Ngwazarma: nilesh
Cache ID: 253:5A9:103

Súbítbayani

Shingilam

  • Súbít #406335: Stirling-Tools Stirling-PDF - Cross Site Scripting (nga nilesh)

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Interested in the pricing of exploits?

See the underground prices here!