Craig Rodway Classroombookings 2.8.7 Session Page /sessions ନାମ କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Craig Rodway Classroombookings 2.8.7 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii /sessions keessa kutaa Session Page keessa. Wanti jijjiirame irratti ନାମ gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-79 si geessa. Odeeffannoon kun yeroo 10/10/2024 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2024-9807 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Meeshaa balaa kana fayyadamuuf hin jirre. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ଅପରିଭାଷିତ ta’uu isaa ibsameera. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. Qabiyyee miidhamte haaromsuuf gorsa ni kennama. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

2 ଆଡାପ୍ଟେସନ୍ · 59 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/10/2024 10:35 AM
ଅଦ୍ୟତନ 1/1
03/07/2025 12:29 PM
software_vendorCraig RodwayCraig Rodway
software_nameClassroombookingsClassroombookings
software_version2.8.72.8.7
software_componentSession PageSession Page
software_file/sessions/sessions
software_argumentNameName
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prHH
cvss3_vuldb_uiRR
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iLL
cvss3_vuldb_aNN
cvss3_vuldb_rlOO
cvss3_vuldb_rcCC
advisory_urlhttps://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20create%20and%20edit%20session%20page%20via%20Administrator%20Dashboard.mdhttps://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20create%20and%20edit%20session%20page%20via%20Administrator%20Dashboard.md
countermeasure_nameଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁ
upgrade_version2.8.82.8.8
source_cveCVE-2024-9807CVE-2024-9807
cna_responsibleVulDBVulDB
response_summaryThe project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional.The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auMM
cvss2_vuldb_ciNN
cvss2_vuldb_iiPP
cvss2_vuldb_aiNN
cvss2_vuldb_rcCC
cvss2_vuldb_rlOFOF
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prHH
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaNN
cvss2_vuldb_eNDND
cvss3_vuldb_eXX
cvss4_vuldb_atNN
cvss4_vuldb_uiNP
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss4_vuldb_eXX
cvss2_vuldb_basescore3.33.3
cvss2_vuldb_tempscore2.92.9
cvss3_vuldb_basescore2.42.4
cvss3_vuldb_tempscore2.32.3
cvss3_meta_basescore2.42.4
cvss3_meta_tempscore2.32.3
cvss4_vuldb_bscore5.14.8
cvss4_vuldb_btscore5.14.8
advisory_date1728511200 (10/10/2024)1728511200 (10/10/2024)
price_0day$0-$5k$0-$5k

Do you want to use VulDB in your project?

Use the official API to access entries easily!