Doc2k RE-Chat 1.0 re_chat.js କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Doc2k RE-Chat 1.0 keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii js_on_radio-emergency.de_/re_chat.js keessa. Hojii jijjiirraa gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-79 geessa. Dadhabbii kana yeroo 04/04/2016 maxxanfameera akka bd17d497ddd3bab4ef9c6831c747c37cc016c570. Odeeffannoon kun buufachuuf github.com irratti qoodameera. Dogoggorri kun akka CVE-2016-15035tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Meeshaa balaa kana fayyadamuuf hin jiru. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ଅପରିଭାଷିତ jedhamee ibsameera. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Beekamtii paachii kanaa bd17d497ddd3bab4ef9c6831c747c37cc016c570 dha. Sirreeffamni rakkoo github.com irratti buufachuuf jira. Paachii fe'uun rakkoo kana furuuf ni gorfama. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 74 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
08/26/2023 10:05 PM
ଅଦ୍ୟତନ 1/2
09/20/2023 04:49 PM
ଅଦ୍ୟତନ 2/2
09/20/2023 04:57 PM
software_vendorDoc2kDoc2kDoc2k
software_nameRE-ChatRE-ChatRE-Chat
software_version1.01.01.0
software_filejs_on_radio-emergency.de_/re_chat.jsjs_on_radio-emergency.de_/re_chat.jsjs_on_radio-emergency.de_/re_chat.js
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_date1459720800 (04/04/2016)1459720800 (04/04/2016)1459720800 (04/04/2016)
advisory_identifierbd17d497ddd3bab4ef9c6831c747c37cc016c570bd17d497ddd3bab4ef9c6831c747c37cc016c570bd17d497ddd3bab4ef9c6831c747c37cc016c570
advisory_urlhttps://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570https://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570https://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍
countermeasure_date1459720800 (04/04/2016)1459720800 (04/04/2016)1459720800 (04/04/2016)
patch_namebd17d497ddd3bab4ef9c6831c747c37cc016c570bd17d497ddd3bab4ef9c6831c747c37cc016c570bd17d497ddd3bab4ef9c6831c747c37cc016c570
countermeasure_patch_urlhttps://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570https://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570https://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570
countermeasure_advisoryquoteErweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSSErweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSSErweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSS
source_cveCVE-2016-15035CVE-2016-15035CVE-2016-15035
cna_responsibleVulDBVulDBVulDB
software_typeChat SoftwareChat SoftwareChat Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_eXXX
cvss2_vuldb_basescore4.04.04.0
cvss2_vuldb_tempscore3.53.53.5
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.43.43.4
cvss3_meta_basescore3.53.54.4
cvss3_meta_tempscore3.43.44.3
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1693000800 (08/26/2023)1693000800 (08/26/2023)
cve_nvd_summaryA vulnerability was found in Doc2k RE-Chat 1.0. It has been classified as problematic. This affects an unknown part of the file js_on_radio-emergency.de_/re_chat.js. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named bd17d497ddd3bab4ef9c6831c747c37cc016c570. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-238155.A vulnerability was found in Doc2k RE-Chat 1.0. It has been classified as problematic. This affects an unknown part of the file js_on_radio-emergency.de_/re_chat.js. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named bd17d497ddd3bab4ef9c6831c747c37cc016c570. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-238155.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciN
cvss2_nvd_iiP
cvss2_nvd_aiN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss2_nvd_basescore4.0
cvss3_nvd_basescore6.1
cvss3_cna_basescore3.5

Want to stay up to date on a daily basis?

Enable the mail alert feature now!