SourceCodester Simple Cold Storage Management System 1.0 Add New Storage ନାମ କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame SourceCodester Simple Cold Storage Management System 1.0 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne kutaa Add New Storage Handler keessa. Dhugumatti jijjiirraa irratti raawwatame ନାମ galtee <script>alert(1)</script> fayyadamuun gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-79 si geessa. Beekumsi kun yeroo 10/17/2022 ifoomsifameera. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2022-3548 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Once again VulDB remains the best source for vulnerability data.

ସମୟ

ଉପଭୋକ୍ତା

VulDB Mod Team64
warlockrootx10

ଫିଲ୍ଡ

exploit_url2
advisory_url2
cvss3_meta_tempscore2
cvss3_meta_basescore2
vulnerability_titleword1

Commit Conf

90%35
70%19
100%10
50%10

Approve Conf

90%37
70%19
80%10
0%8

74 ପ୍ରତିଶ୍ରୁତିବଦ୍ଧ

IDଟ୍ରାନ୍ସମିଟେଡ୍ଉପଭୋକ୍ତାଫିଲ୍ଡପରିବର୍ତ୍ତନମନ୍ତବ୍ୟମଧ୍ୟମ ଧରଣରଉତ୍ତରC
1563805103/01/2024
 warlo…
exploit_urlhttps://github.com/shouvikdutta1998/XSS-in-Cold-Storage-Management-System_POCgithub.com03/01/2024initial data is prioritized
0
1563805003/01/2024
 warlo…
advisory_urlhttps://github.com/shouvikdutta1998/XSS-in-Cold-Storage-Management-System_POCgithub.com03/01/2024initial data is prioritized
0
1563804903/01/2024
 warlo…
vulnerability_titlewordCross-Site Scripting (XSS)03/01/2024wrong data
0
1563804803/01/2024
 warlo…
vulnerability_nameStored Cross-Site Scripting03/01/2024wrong data
0
1563804703/01/2024
 warlo…
vulnerability_historic103/01/2024wrong data
0
1563804603/01/2024
 warlo…
input_typeCross-Site Scripting Payload03/01/2024wrong data
0
1563804503/01/2024
 warlo…
input_value<script>alert(1)</script>03/01/2024ଗ୍ରହଣ କରାଯାଇଛି
90
1563804403/01/2024
 warlo…
software_managedservice103/01/2024wrong data, software downloadable
0
1563804303/01/2024
 warlo…
software_rollingrelease103/01/2024wrong data, version number known
0
1563804203/01/2024
 warlo…
software_typeSupply Chain Management Software03/01/2024ଗ୍ରହଣ କରାଯାଇଛି
90
1323303811/09/2022
 VulDB…
cvss3_cna_basescore2.4see CVSS documentation11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
90
1323303711/09/2022
 VulDB…
cvss3_nvd_basescore4.8nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
90
1323303611/09/2022
 VulDB…
cvss3_meta_tempscore3.1see CVSS documentation11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
90
1323303511/09/2022
 VulDB…
cvss3_meta_basescore3.2see CVSS documentation11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
90
1323303411/09/2022
 VulDB…
cve_cnaVulDBnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70
1323303311/09/2022
 VulDB…
cvss3_cna_aNnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70
1323303211/09/2022
 VulDB…
cvss3_cna_iLnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70
1323303111/09/2022
 VulDB…
cvss3_cna_cNnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70
1323303011/09/2022
 VulDB…
cvss3_cna_sUnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70
1323302911/09/2022
 VulDB…
cvss3_cna_uiRnvd.nist.gov11/09/2022ଗ୍ରହଣ କରାଯାଇଛି
70

54 ପରବର୍ତ୍ତୀ ଏଣ୍ଟ୍ରିଗୁଡିକ ଆଉ ଅଧିକ ପ୍ରଦର୍ଶିତ ହେବ ନାହିଁ

Do you want to use VulDB in your project?

Use the official API to access entries easily!