OFCMS 1.1.2 add.json?sqlid=system.dict.save add dict_value କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu OFCMS 1.1.2 keessatti argameera. Kan miidhamte is hojii ଯୋଡନ୍ତୁ faayilii /admin/system/dict/add.json?sqlid=system.dict.save keessa. Hojii jijjiirraa irratti gaggeeffame dict_value gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-79 geessa. Dadhabbii kana yeroo 10/01/2024 maxxanfameera akka IATECW. Odeeffannoon kun buufachuuf gitee.com irratti qoodameera. Dogoggorri kun akka CVE-2024-9411tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana gitee.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

5 ଆଡାପ୍ଟେସନ୍ · 96 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/01/2024 04:50 PM
ଅଦ୍ୟତନ 1/4
10/02/2024 09:00 AM
ଅଦ୍ୟତନ 2/4
10/02/2024 01:34 PM
ଅଦ୍ୟତନ 3/4
03/09/2025 01:32 AM
ଅଦ୍ୟତନ 4/4
05/28/2025 05:54 AM
software_nameOFCMSOFCMSOFCMSOFCMSOFCMS
software_version1.1.21.1.21.1.21.1.21.1.2
software_file/admin/system/dict/add.json?sqlid=system.dict.save/admin/system/dict/add.json?sqlid=system.dict.save/admin/system/dict/add.json?sqlid=system.dict.save/admin/system/dict/add.json?sqlid=system.dict.save/admin/system/dict/add.json?sqlid=system.dict.save
software_functionaddaddaddaddadd
software_argumentdict_valuedict_valuedict_valuedict_valuedict_value
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_identifierIATECWIATECWIATECWIATECWIATECW
advisory_urlhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECW
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECWhttps://gitee.com/oufu/ofcms/issues/IATECW
source_cveCVE-2024-9411CVE-2024-9411CVE-2024-9411CVE-2024-9411CVE-2024-9411
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNPP
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.23.2
cvss3_meta_basescore3.54.14.14.14.1
cvss3_meta_tempscore3.24.04.04.03.3
cvss4_vuldb_bscore5.35.35.35.15.1
cvss4_vuldb_btscore2.12.12.12.02.0
advisory_date1727733600 (10/01/2024)1727733600 (10/01/2024)1727733600 (10/01/2024)1727733600 (10/01/2024)1727733600 (10/01/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prHHHL
cvss3_cna_uiRRRR
cvss3_cna_sCCCU
cvss3_cna_cLLLN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore4.84.84.83.5
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore4444
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como problemática en OFCMS 1.1.2. Afecta a la función add del archivo /admin/system/dict/add.json?sqlid=system.dict.save. La manipulación del argumento dict_value provoca ataques de Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en OFCMS 1.1.2. Afecta a la función add del archivo /admin/system/dict/add.json?sqlid=system.dict.save. La manipulación del argumento dict_value provoca ataques de Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en OFCMS 1.1.2. Afecta a la función add del archivo /admin/system/dict/add.json?sqlid=system.dict.save. La manipulación del argumento dict_value provoca ataques de Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3

Do you want to use VulDB in your project?

Use the official API to access entries easily!