zerochplus thread.res.pl PrintResList Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
4.8$0-$5k0.00

Gundumabayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a zerochplus. Hakika, aikin PrintResList ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil test/mordor/thread.res.pl, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Wannan matsala ana saninta da CVE-2013-10010. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu. Ana shawartar a saka patch domin warware wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Furɗebayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a zerochplus. Hakika, aikin PrintResList ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil test/mordor/thread.res.pl, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 01/11/2023 kamar 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. An raba bayanin tsaro don saukewa a github.com.

Wannan matsala ana saninta da CVE-2013-10010. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.

Ana kiran patch ɗin da 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. Bugfix ɗin an shirya shi don saukewa a github.com. Ana shawartar a saka patch domin warware wannan matsala. Wannan shawara ta ƙunshi wannan magana:

パスワード抜きのXSS脆弱性対策

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Kayanbayani

Sunu

Laisens

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 4.9
VulDB Meta Temp Score: 4.8

VulDB Ganda Borno: 4.3
VulDB Temp Score: 4.1
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 6.1
NVD Furɗo: 🔍

CNA Ganda Borno: 4.3
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Kari
Halitta: 🔍

0-Day Gana: 🔍

Kari: 9ddf9ecca8565341d8d26a3b2f64540bde4fa273

Waktin layibayani

01/11/2023 🔍
01/11/2023 +0 Hənde 🔍
01/11/2023 +0 Hənde 🔍
02/01/2023 +21 Hənde 🔍

Ngizimbayani

Kayan: github.com

Gargaaji: 9ddf9ecca8565341d8d26a3b2f64540bde4fa273
Halitta: Gaskiya

CVE: CVE-2013-10010 (🔍)
GCVE (CVE): GCVE-0-2013-10010
GCVE (VulDB): GCVE-100-218007

Gumtibayani

Súgá: 01/11/2023 16:03
Gargadi: 02/01/2023 17:03
Goyarwa: 01/11/2023 16:03 (41), 02/01/2023 16:56 (2), 02/01/2023 17:03 (28)
Gadankam: 🔍
Cache ID: 253:A92:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you need the next level of professionalism?

Upgrade your account now!