Portabilis i-Educar 2.10 educar_matricula_lst.php Gerar ref_cod_aluno क्रॉस साइट स्क्रिप्टिंग

एक असुरक्षितता जी समस्याग्रस्त म्हणून वर्गीकृत आहे, ती Portabilis i-Educar 2.10 मध्ये आढळली आहे. प्रभावित आहे फंक्शन Gerar फाइल ieducar/intranet/educar_matricula_lst.php च्या. सॉफ्टवेअरमध्ये ref_cod_aluno या आर्ग्युमेंटचे केलेली छेडछाड क्रॉस साइट स्क्रिप्टिंग निर्माण करते. CWE वापरून समस्या घोषित केल्याने CWE-79 कडे नेले जाते. कमजोरी प्रकाशित करण्यात आली होती 02/08/2025. सल्ला डाउनलोडसाठी github.com येथे शेअर केला आहे. ही असुरक्षा CVE-2025-8510 म्हणून नोंदवली गेली आहे. हल्ला दूरस्थपणे सुरू करणे शक्य आहे. तांत्रिक तपशील उपलब्ध आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे उघड झाले आहे आणि वापरले जाऊ शकते. सध्याच्या घडीला अंदाजे USD $0-$5k असू शकतो. MITRE ATT&CK प्रकल्पाने हल्ल्याची तंत्रज्ञान T1059.007 म्हणून घोषित केली आहे. हे प्रूफ-ऑफ-कॉन्सेप्ट म्हणून घोषित केले आहे. डाउनलोडसाठी शोषण github.com वर उपलब्ध आहे. 0-डे म्हणून अंदाजे अंडरग्राउंड किंमत सुमारे $0-$5k होती. 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46 हे पॅचचे नाव आहे. बगफिक्स github.com वर डाउनलोडसाठी तयार आहे. ही समस्या सोडवण्यासाठी पॅच लागू करणे शिफारसीय आहे. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

4 बदल · 104 डेटा पॉइंट्स

शेततयार केली
02/08/2025 05:26 PM
अद्ययावत 1/3
03/08/2025 03:37 PM
अद्ययावत 2/3
03/08/2025 05:22 PM
अद्ययावत 3/3
13/08/2025 07:40 AM
software_vendorPortabilisPortabilisPortabilisPortabilis
software_namei-Educari-Educari-Educari-Educar
software_version2.102.102.102.10
software_fileieducar/intranet/educar_matricula_lst.phpieducar/intranet/educar_matricula_lst.phpieducar/intranet/educar_matricula_lst.phpieducar/intranet/educar_matricula_lst.php
software_functionGerarGerarGerarGerar
software_argumentref_cod_alunoref_cod_alunoref_cod_alunoref_cod_aluno
vulnerability_cweCWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_urlhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md
advisory_confirm_urlhttps://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xghttps://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xghttps://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xghttps://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xg
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.mdhttps://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md
countermeasure_nameठिगळठिगळठिगळठिगळ
patch_name82c288b9a4abb084bdfa1c0c4ef777ed45f98b4682c288b9a4abb084bdfa1c0c4ef777ed45f98b4682c288b9a4abb084bdfa1c0c4ef777ed45f98b4682c288b9a4abb084bdfa1c0c4ef777ed45f98b46
countermeasure_patch_urlhttps://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46
source_cveCVE-2025-8510CVE-2025-8510CVE-2025-8510CVE-2025-8510
cna_responsibleVulDBVulDBVulDBVulDB
response_summaryThe vendor initially closed the original advisory without requesting a CVE.The vendor initially closed the original advisory without requesting a CVE.The vendor initially closed the original advisory without requesting a CVE.The vendor initially closed the original advisory without requesting a CVE.
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_uiPPPP
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss3_vuldb_prLLLL
cvss4_vuldb_atNNNN
cvss4_vuldb_prLLLL
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.13.13.13.1
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.2
cvss3_meta_basescore3.53.53.54.1
cvss3_meta_tempscore3.23.33.34.0
cvss4_vuldb_bscore5.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.0
advisory_date1754085600 (02/08/2025)1754085600 (02/08/2025)1754085600 (02/08/2025)1754085600 (02/08/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE.
cvss4_cna_avNNN
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prLLL
cvss4_cna_uiPPP
cvss4_cna_vcNNN
cvss4_cna_viLLL
cvss4_cna_vaNNN
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore5.15.15.1
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiRRR
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iLLL
cvss3_cna_aNNN
cvss3_cna_basescore3.53.53.5
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auSSS
cvss2_cna_ciNNN
cvss2_cna_iiPPP
cvss2_cna_aiNNN
cvss2_cna_basescore444
euvd_idEUVD-2025-23476EUVD-2025-23476
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como problemática en Portabilis i-Educar 2.10. Esta afecta a la función Gerar del archivo ieducar/intranet/educar_matricula_lst.php. La manipulación del argumento ref_cod_aluno provoca ataques de Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. El identificador del parche es 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. Se recomienda aplicar un parche para solucionar este problema. El proveedor inicialmente cerró el aviso original sin solicitar una CVE.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4

Do you want to use VulDB in your project?

Use the official API to access entries easily!