Doc2k RE-Chat 1.0 re_chat.js Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
4.3$0-$5k0.11

Gundumabayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Doc2k RE-Chat 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil js_on_radio-emergency.de_/re_chat.js, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Wannan matsala ana saninta da CVE-2016-15035. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu. Ana shawartar a saka patch domin warware wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Furɗebayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Doc2k RE-Chat 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil js_on_radio-emergency.de_/re_chat.js, a cikin sashen $software_component. A sa manipulation ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 04/04/2016 kamar bd17d497ddd3bab4ef9c6831c747c37cc016c570. An raba bayanin tsaro don saukewa a github.com.

Wannan matsala ana saninta da CVE-2016-15035. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.

Ana kiran patch ɗin da bd17d497ddd3bab4ef9c6831c747c37cc016c570. Bugfix ɗin an shirya shi don saukewa a github.com. Ana shawartar a saka patch domin warware wannan matsala. Wannan shawara ta ƙunshi wannan magana:

Erweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSS

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Kayanbayani

Nganji

Ngilabe

Sunu

Furɗe

Laisens

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 4.4
VulDB Meta Temp Score: 4.3

VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 6.1
NVD Furɗo: 🔍

CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Kari
Halitta: 🔍

Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍

Kari: bd17d497ddd3bab4ef9c6831c747c37cc016c570

Waktin layibayani

04/04/2016 🔍
04/04/2016 +0 Hənde 🔍
08/26/2023 +2700 Hənde 🔍
08/26/2023 +0 Hənde 🔍
09/20/2023 +25 Hənde 🔍

Ngizimbayani

Kayan: github.com

Gargaaji: bd17d497ddd3bab4ef9c6831c747c37cc016c570
Halitta: Gaskiya

CVE: CVE-2016-15035 (🔍)
GCVE (CVE): GCVE-0-2016-15035
GCVE (VulDB): GCVE-100-238155

Gumtibayani

Súgá: 08/26/2023 22:05
Gargadi: 09/20/2023 16:57
Goyarwa: 08/26/2023 22:05 (44), 09/20/2023 16:49 (2), 09/20/2023 16:57 (28)
Gadankam: 🔍
Cache ID: 253:0A2:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Might our Artificial Intelligence support you?

Check our Alexa App!