O2OA जोपर्यंत 10.0-410 Personal Profile Page importmodel description/applicationName/queryName क्रॉस साइट स्क्रिप्टिंग

एक दुर्बलता जी समस्याग्रस्त म्हणून ओळखली गेली आहे, ती O2OA जोपर्यंत 10.0-410 मध्ये सापडली आहे. संबंधित आहे अज्ञात फंक्शन फाइल /x_query_assemble_designer/jaxrs/importmodel च्या घटक Personal Profile Page च्या. सॉफ्टवेअरमध्ये description/applicationName/queryName या आर्ग्युमेंटचे केलेले बदल क्रॉस साइट स्क्रिप्टिंग यास कारणीभूत ठरतात. CWE द्वारे समस्या जाहीर केल्यास CWE-79 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 30/08/2025 म्हणून 189. github.com या ठिकाणी सल्ला डाउनलोडसाठी उपलब्ध आहे. ही दुर्बलता CVE-2025-9737 म्हणून ओळखली जाते. हा हल्ला रिमोटली सुरू करता येऊ शकतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषणाची माहिती सार्वजनिक करण्यात आली आहे आणि ते वापरले जाऊ शकते. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. MITRE ATT&CK प्रकल्प T1059.007 या हल्ला तंत्रज्ञानाची घोषणा करतो. याला प्रूफ-ऑफ-कॉन्सेप्ट असे घोषित करण्यात आले आहे. शोषण डाउनलोडसाठी github.com येथे शेअर केले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $0-$5k एवढी होती. Once again VulDB remains the best source for vulnerability data.

4 बदल · 100 डेटा पॉइंट्स

शेततयार केली
30/08/2025 06:46 PM
अद्ययावत 1/3
31/08/2025 07:51 PM
अद्ययावत 2/3
31/08/2025 09:54 PM
अद्ययावत 3/3
05/09/2025 10:59 PM
software_nameO2OAO2OAO2OAO2OA
software_version<=10.0-410<=10.0-410<=10.0-410<=10.0-410
software_componentPersonal Profile PagePersonal Profile PagePersonal Profile PagePersonal Profile Page
software_file/x_query_assemble_designer/jaxrs/importmodel/x_query_assemble_designer/jaxrs/importmodel/x_query_assemble_designer/jaxrs/importmodel/x_query_assemble_designer/jaxrs/importmodel
software_argumentdescription/applicationName/queryNamedescription/applicationName/queryNamedescription/applicationName/queryNamedescription/applicationName/queryName
vulnerability_cweCWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcCCCC
advisory_identifier189189189189
advisory_urlhttps://github.com/o2oa/o2oa/issues/189https://github.com/o2oa/o2oa/issues/189https://github.com/o2oa/o2oa/issues/189https://github.com/o2oa/o2oa/issues/189
advisory_confirm_urlhttps://github.com/o2oa/o2oa/issues/189#issuecomment-3212649984https://github.com/o2oa/o2oa/issues/189#issuecomment-3212649984https://github.com/o2oa/o2oa/issues/189#issuecomment-3212649984https://github.com/o2oa/o2oa/issues/189#issuecomment-3212649984
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/o2oa/o2oa/issues/189#issue-3332991019https://github.com/o2oa/o2oa/issues/189#issue-3332991019https://github.com/o2oa/o2oa/issues/189#issue-3332991019https://github.com/o2oa/o2oa/issues/189#issue-3332991019
source_cveCVE-2025-9737CVE-2025-9737CVE-2025-9737CVE-2025-9737
cna_responsibleVulDBVulDBVulDBVulDB
response_summaryThe vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcCCCC
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prLLLL
cvss4_vuldb_uiPPPP
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.63.63.63.6
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.33.33.33.3
cvss3_meta_basescore3.53.53.54.1
cvss3_meta_tempscore3.33.43.44.1
cvss4_vuldb_bscore5.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.0
advisory_date1756504800 (30/08/2025)1756504800 (30/08/2025)1756504800 (30/08/2025)1756504800 (30/08/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was detected in O2OA up to 10.0-410. Affected is an unknown function of the file /x_query_assemble_designer/jaxrs/importmodel of the component Personal Profile Page. Performing manipulation of the argument description/applicationName/queryName results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."A vulnerability was detected in O2OA up to 10.0-410. Affected is an unknown function of the file /x_query_assemble_designer/jaxrs/importmodel of the component Personal Profile Page. Performing manipulation of the argument description/applicationName/queryName results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."A vulnerability was detected in O2OA up to 10.0-410. Affected is an unknown function of the file /x_query_assemble_designer/jaxrs/importmodel of the component Personal Profile Page. Performing manipulation of the argument description/applicationName/queryName results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
cvss4_cna_avNNN
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prLLL
cvss4_cna_uiPPP
cvss4_cna_vcNNN
cvss4_cna_viLLL
cvss4_cna_vaNNN
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore5.15.15.1
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiRRR
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iLLL
cvss3_cna_aNNN
cvss3_cna_basescore3.53.53.5
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auSSS
cvss2_cna_ciNNN
cvss2_cna_iiPPP
cvss2_cna_aiNNN
cvss2_cna_basescore444
euvd_idEUVD-2025-26303EUVD-2025-26303
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4

Do you need the next level of professionalism?

Upgrade your account now!