SoftLab Integrate Google Drive Plugin kuze kube 1.3.3 ku WordPress amalungelo andlule

CVSS Meta Temp IsilinganisoIntengo yamanje ye-exploit (≈)CTI Inzalo Score
5.6$0-$5k0.00

Isifinyezoulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku SoftLab Integrate Google Drive Plugin kuze kube 1.3.3 ku WordPress. Kuthintekile umsebenzi $software_function. Ukuguqulwa kubangela uhlobo lwe amalungelo andlule. Le buthakathaka ibizwa ngokuthi CVE-2023-52177. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. I-exploit ayitholakali. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Iinkcukachaulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku SoftLab Integrate Google Drive Plugin kuze kube 1.3.3 ku WordPress. Kuthintekile umsebenzi $software_function. Ukuguqulwa kubangela uhlobo lwe amalungelo andlule. Ukusebenzisa i-CWE ukumemezela inkinga kuholela ku-CWE-862. Lobu buthakathaka bakhishwa obala ngu Nguyen Xuan Chien. Isaziso sitholakala ukuthi singalayishwa ku-patchstack.com.

Le buthakathaka ibizwa ngokuthi CVE-2023-52177. I-CVE yanikezwa ngo-2023-12-29. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Akukho mininingwane yezobuchwepheshe etholakalayo. Ukuduma kwalobu buthakathi kungaphansi kokujwayelekile. I-exploit ayitholakali. Okwamanje, intengo yamanje ye-exploit ingaba cishe USD $0-$5k ngalesi sikhathi.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Umkhiqizoulwazi

Uhlobo

Umkhiqizi

Ibizo

Inguqulo

CPE 2.3ulwazi

CPE 2.2ulwazi

CVSSv4ulwazi

VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CVSSv3ulwazi

VulDB Ireyithingi yeMeta Base: 5.7
VulDB Meta Temp Isilinganiso: 5.6

VulDB Isilinganiso Esiyisisekelo: 5.4
VulDB Izinga Lesikhashana: 5.2
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

NVD Isilinganiso Esiyisisekelo: 6.3
NVD Umkhombandlela: 🔍

CNA Isilinganiso Esiyisisekelo: 5.4
CNA Umkhombandlela: 🔍

CVSSv2ulwazi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
UmkhombandlelaUbunzimaUkufakazela ubuwenaUkuyimfihloUkuthembekaUkutholakala
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍

Ukusebenzisa ithuba lokungavikelekiulwazi

Ikilasi: Amalungelo andlule
CWE: CWE-862 / CWE-863 / CWE-285
CAPEC: 🔍
ATT&CK: 🔍

Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo

Ukutholakala: 🔍
Isimo: Akuchazwanga

EPSS Score: 🔍
EPSS Percentile: 🔍

Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍

0-Dayvula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
Namuhlavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

Ulwazi lwezingoziulwazi

Intshisekelo: 🔍
Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍

Izinyathelo zokuvikelaulwazi

Isincomo: akukho sithathwa esaziwayo
Isimo: 🔍

0-Suku Isikhathi: 🔍

Isikhathi somlandoulwazi

2023-12-29 🔍
2024-06-12 +165 Izinsuku 🔍
2024-06-12 +0 Izinsuku 🔍
2024-07-19 +36 Izinsuku 🔍

Imithomboulwazi

Iseluleko: patchstack.com
Umuntu: Nguyen Xuan Chien
Isimo: Akuchazwanga

CVE: CVE-2023-52177 (🔍)
GCVE (CVE): GCVE-0-2023-52177
GCVE (VulDB): GCVE-100-268143

Ukungenaulwazi

Kudalwa: 2024-06-12 11:12
Ukuvuselelwa: 2024-07-19 01:04
Ukulungiswa: 2024-06-12 11:12 (62), 2024-06-14 14:26 (1), 2024-07-19 01:04 (11)
Kugcwele: 🔍
Cache ID: 253:4A3:103

Ingxoxo

Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.

Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.

Interested in the pricing of exploits?

See the underground prices here!