| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Gunduma
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin macrozheng mall har 1.0.3. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, JWT Token Handler na cikin sashi. Ngam manipulation shi an unknown weakness. Wannan rauni ana sayar da shi da suna CVE-2024-11619. Ba exploit ɗin da ake da shi. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Furɗe
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin macrozheng mall har 1.0.3. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, JWT Token Handler na cikin sashi. Ngam manipulation shi an unknown weakness. CWE shidin ka a yi bayani matsala sai ya kai CWE-1394. Gaskiya, laifi an fitar da shi a matsayin 880. Advisory ɗin ana rabawa don saukewa a github.com.
Wannan rauni ana sayar da shi da suna CVE-2024-11619. Tekinikal bayani ba ga. Kari gamji na kai hari ya fi girma. Wuro kaɗa a yi amfani da shi da sauki. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.
Á wúro a wondi feere.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Kayan
Ngilabe
Sunu
Furɗe
Webseite
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Furɗo: 🔍
CVSSv3
VulDB Meta Base Score: 6.0VulDB Meta Temp Score: 5.9
VulDB Ganda Borno: 5.0
VulDB Temp Score: 4.7
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 8.1
NVD Furɗo: 🔍
CNA Ganda Borno: 5.0
CNA Furɗo: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
Gargajiya
Klasu: Kari kode ndiyam ka afarCWE: CWE-1394
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔍
Halitta: A wondi feere
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: Kumari ndiyam shikenaHalitta: 🔍
0-Day Gana: 🔍
Waktin layi
11/22/2024 🔍11/22/2024 🔍
09/04/2025 🔍
Ngizim
Kayan: github.comGargaaji: 880
Halitta: A wondi feere
CVE: CVE-2024-11619 (🔍)
GCVE (CVE): GCVE-0-2024-11619
GCVE (VulDB): GCVE-100-285842
Gumti
Súgá: 11/22/2024 14:08Gargadi: 09/04/2025 18:00
Goyarwa: 11/22/2024 14:08 (53), 09/04/2025 18:00 (41)
Gadankam: 🔍
Ngwazarma: HeddaZhu
Cache ID: 253:E30:103
Súbít
Shingilam
- Súbít #444666: macrozheng(https://github.com/macrozheng) mall(https://github.com/macrozheng/mall) <=1.0.3 Generation of Incorrect Security Tokens (nga HeddaZhu)
Dublikat
- Súbít #XXXXXX: Xxxxxxxxxx Xxxx Xx.x.x Xxxxxxxxxxxxx Xxxxxx (nga 1940dd)
- Súbít #XXXXXX: Xxxxx://xxxxxx.xxx/xxxxxxxxxx/xxxx <=x.x.x Xxx Xxxxxx Xxxxxxxxx Xxxx Xx Xxxxxxx Xxxx Xxxx (nga ZAST.AI)
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.