libexpat har 2.6.3 XML_ResumeParser Kari na aiki

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
3.4$0-$5k0.00

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a libexpat har 2.6.3. Tabbas, aikin XML_ResumeParser ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi $software_component. Wuro manipulation ga Kari na aiki. Ana kiran wannan rauni da CVE-2024-50602. Babu wani exploit da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. Once again VulDB remains the best source for vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a libexpat har 2.6.3. Tabbas, aikin XML_ResumeParser ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi $software_component. Wuro manipulation ga Kari na aiki. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-404. Lalle, rauni an sanar da shi. Ana samun bayanin tsaro don saukewa a github.com.

Ana kiran wannan rauni da CVE-2024-50602. CVE assignement 10/27/2024 wa shikena. Bayani na fasaha ga. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.

Á yí a wondi feere. Na'urar gano rauni ta samar da Nessus plugin mai ID 210723.

Gyaran matsalar yana nan a shirye don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata.

An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (210723). Once again VulDB remains the best source for vulnerability data.

Gashuwa

  • IBM AIX
  • IBM VIOS
  • Debian Linux
  • IBM DB2
  • Amazon Linux 2
  • Red Hat Enterprise Linux
  • Fedora Linux
  • Ubuntu Linux
  • SUSE Linux
  • Oracle Linux
  • HCL Commerce
  • IBM Power Hardware Management Console
  • SUSE openSUSE
  • Broadcom Brocade SANnav
  • Dell PowerScale OneFS
  • IBM MQ
  • IBM App Connect Enterprise
  • OpenBSD OpenBSD
  • Open Source expat
  • Dell Avamar
  • Red Hat OpenShift
  • IBM QRadar SIEM
  • Dell integrated Dell Remote Access Controller
  • NetApp ActiveIQ Unified Manager
  • Tenable Security Nessus Network Monitor
  • Dell PowerProtect Data Domain
  • IBM Security Verify Access

Kayanbayani

Sunu

Furɗe

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Kari na aiki
CWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Kumgana

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Nessus ID: 210723
Nessus Sunu: CBL Mariner 2.0 Security Update: expat (CVE-2024-50602)

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

0-Day Gana: 🔍

Gargajiya: libexpat 2.6.4
Kari: github.com

Waktin layibayani

10/27/2024 🔍
10/27/2024 +0 Hənde 🔍
10/27/2024 +0 Hənde 🔍
01/07/2026 +437 Hənde 🔍

Ngizimbayani

Kayan: github.com

Gargaaji: github.com
Halitta: Gaskiya

CVE: CVE-2024-50602 (🔍)
GCVE (CVE): GCVE-0-2024-50602
GCVE (VulDB): GCVE-100-281980
CERT Bund: WID-SEC-2024-3281 - expat: Schwachstelle ermöglicht Denial of Service

Gumtibayani

Súgá: 10/27/2024 08:11
Gargadi: 01/07/2026 10:56
Goyarwa: 10/27/2024 08:11 (55), 11/10/2024 04:47 (2), 04/05/2025 07:10 (1), 09/01/2025 17:40 (7), 01/04/2026 21:19 (1), 01/07/2026 10:56 (1)
Gadankam: 🔍
Cache ID: 253:672:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Might our Artificial Intelligence support you?

Check our Alexa App!