| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 4.3 | $0-$5k | 0.11 |
Gunduma
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Doc2k RE-Chat 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil js_on_radio-emergency.de_/re_chat.js, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Wannan matsala ana saninta da CVE-2016-15035. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu. Ana shawartar a saka patch domin warware wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Furɗe
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Doc2k RE-Chat 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil js_on_radio-emergency.de_/re_chat.js, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 04/04/2016 kamar bd17d497ddd3bab4ef9c6831c747c37cc016c570. An raba bayanin tsaro don saukewa a github.com.
Wannan matsala ana saninta da CVE-2016-15035. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.
Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.
Ana kiran patch ɗin da bd17d497ddd3bab4ef9c6831c747c37cc016c570. Bugfix ɗin an shirya shi don saukewa a github.com. Ana shawartar a saka patch domin warware wannan matsala. Wannan shawara ta ƙunshi wannan magana:
Erweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSS
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Kayan
Nganji
Ngilabe
Sunu
Furɗe
Laisens
Webseite
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CVSSv3
VulDB Meta Base Score: 4.4VulDB Meta Temp Score: 4.3
VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 6.1
NVD Furɗo: 🔍
CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 🔍
Gargajiya
Klasu: Cross Site ScriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔍
Halitta: A wondi feere
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: KariHalitta: 🔍
Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍
Kari: bd17d497ddd3bab4ef9c6831c747c37cc016c570
Waktin layi
04/04/2016 🔍04/04/2016 🔍
08/26/2023 🔍
08/26/2023 🔍
09/20/2023 🔍
Ngizim
Kayan: github.comGargaaji: bd17d497ddd3bab4ef9c6831c747c37cc016c570
Halitta: Gaskiya
CVE: CVE-2016-15035 (🔍)
GCVE (CVE): GCVE-0-2016-15035
GCVE (VulDB): GCVE-100-238155
Gumti
Súgá: 08/26/2023 22:05Gargadi: 09/20/2023 16:57
Goyarwa: 08/26/2023 22:05 (44), 09/20/2023 16:49 (2), 09/20/2023 16:57 (28)
Gadankam: 🔍
Cache ID: 253:0A2:103
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.