zerochplus thread.res.pl PrintResList Ukubhalwa kwekhodi okweqa indawo

Kukhona ubuthakathaka obubizwa ngokuthi kuyinkinga obutholakele ku zerochplus. Kuthinteka umsebenzi ongaziwayo kufayela test/mordor/thread.res.pl. Ukusebenzisa kuholela ku Ukubhalwa kwekhodi okweqa indawo. Ukusebenzisa i-CWE ukukhomba inkinga kuholela ku-CWE-79. Ubuthakathaka babikwa 2023-01-11 njenge 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. Isaziso sabelwe ukuthi singalayishwa ku-github.com. Lokhu buthakathaka kuthengiswa njenge CVE-2013-10010. Kuyenzeka ukuqala ukuhlasela kude. Imininingwane yezobuchwepheshe iyatholakala. Akukho i-exploit etholakalayo. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje. Isazisi sepatchi ngu-9ddf9ecca8565341d8d26a3b2f64540bde4fa273. Isilungiso sesilungele ukulanda ku-github.com. Kuyatuseka ukufaka iphetshi ukulungisa loludaba. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

3 Ukulungiswa · 71 Amaphuzu wedatha

InsimuKudalwa
2023-01-11 16:03
Ukuvuselelwa 1/2
2023-02-01 16:56
Ukuvuselelwa 2/2
2023-02-01 17:03
software_namezerochpluszerochpluszerochplus
software_filetest/mordor/thread.res.pltest/mordor/thread.res.pltest/mordor/thread.res.pl
software_functionPrintResListPrintResListPrintResList
vulnerability_cweCWE-79 (Ukubhalwa kwekhodi okweqa indawo)CWE-79 (Ukubhalwa kwekhodi okweqa indawo)CWE-79 (Ukubhalwa kwekhodi okweqa indawo)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier9ddf9ecca8565341d8d26a3b2f64540bde4fa2739ddf9ecca8565341d8d26a3b2f64540bde4fa2739ddf9ecca8565341d8d26a3b2f64540bde4fa273
advisory_urlhttps://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273
countermeasure_nameIphethshiIphethshiIphethshi
patch_name9ddf9ecca8565341d8d26a3b2f64540bde4fa2739ddf9ecca8565341d8d26a3b2f64540bde4fa2739ddf9ecca8565341d8d26a3b2f64540bde4fa273
countermeasure_patch_urlhttps://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273
countermeasure_advisoryquoteパスワード抜きのXSS脆弱性対策パスワード抜きのXSS脆弱性対策パスワード抜きのXSS脆弱性対策
source_cveCVE-2013-10010CVE-2013-10010CVE-2013-10010
cna_responsibleVulDBVulDBVulDB
advisory_date1673391600 (2023-01-11)1673391600 (2023-01-11)1673391600 (2023-01-11)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.44.44.4
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore4.14.14.1
cvss3_meta_basescore4.34.34.9
cvss3_meta_tempscore4.14.14.8
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1673391600 (2023-01-11)1673391600 (2023-01-11)
cve_nvd_summaryA vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007.A vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auN
cvss2_nvd_ciN
cvss2_nvd_iiP
cvss2_nvd_aiN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss2_nvd_basescore5.0
cvss3_nvd_basescore6.1
cvss3_cna_basescore4.3

Interested in the pricing of exploits?

See the underground prices here!