Emlog Pro kuze kube 2.4.1 /admin/store.php Usuku Ukubhalwa kwekhodi okweqa indawo
| CVSS Meta Temp Isilinganiso | Intengo yamanje ye-exploit (≈) | CTI Inzalo Score |
|---|---|---|
| 4.1 | $0-$5k | 0.00 |
Isifinyezo
Kutholakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku Emlog Pro kuze kube 2.4.1. Kuthintekile umsebenzi ongaziwayo kufayela /admin/store.php. Ukuguqulwa kwepharamitha Usuku kubangela uhlobo lwe Ukubhalwa kwekhodi okweqa indawo. Le buthakathaka ibizwa ngokuthi CVE-2024-12844. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Ngaphezu kwalokho, i-exploit iyatholakala. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Iinkcukacha
Kutholakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku Emlog Pro kuze kube 2.4.1. Kuthintekile umsebenzi ongaziwayo kufayela /admin/store.php. Ukuguqulwa kwepharamitha Usuku kubangela uhlobo lwe Ukubhalwa kwekhodi okweqa indawo. Ukusebenzisa i-CWE ukumemezela inkinga kuholela ku-CWE-79. Lobu buthakathaka bakhishwa obala njenge Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1 #305. Isaziso sitholakala ukuthi singalayishwa ku-github.com.
Le buthakathaka ibizwa ngokuthi CVE-2024-12844. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Imininingwane yezobuchwepheshe iyatholakala. Ukuduma kwalobu buthakathi kungaphansi kokujwayelekile. Ngaphezu kwalokho, i-exploit iyatholakala. Ukuhlaselwa sekumenyezelwe emphakathini futhi kungenzeka kusetshenziswe. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.
Kungenzeka ukuthi i-exploit ingalandwa ku-github.com.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Umkhiqizo
Ibizo
Inguqulo
CPE 2.3
CPE 2.2
CVSSv4
VulDB Umkhombandlela: 🔍VulDB Ukuthembeka: 🔍
CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Umkhombandlela: 🔍
CVSSv3
VulDB Ireyithingi yeMeta Base: 4.3VulDB Meta Temp Isilinganiso: 4.1
VulDB Isilinganiso Esiyisisekelo: 4.3
VulDB Izinga Lesikhashana: 3.9
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍
CNA Isilinganiso Esiyisisekelo: 4.3
CNA Umkhombandlela: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Umkhombandlela | Ubunzima | Ukufakazela ubuwena | Ukuyimfihlo | Ukuthembeka | Ukutholakala |
|---|---|---|---|---|---|
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍
Ukusebenzisa ithuba lokungavikeleki
Ikilasi: Ukubhalwa kwekhodi okweqa indawoCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo
Ukutholakala: 🔍
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔍
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍
| 0-Day | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
|---|---|---|---|---|
| Namuhla | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
Ulwazi lwezingozi
Intshisekelo: 🔍Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍
Izinyathelo zokuvikela
Isincomo: akukho sithathwa esaziwayoIsimo: 🔍
0-Suku Isikhathi: 🔍
Isikhathi somlando
2024-12-20 🔍2024-12-20 🔍
2025-02-16 🔍
Imithombo
Iseluleko: Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1 #305Isimo: Akuchazwanga
CVE: CVE-2024-12844 (🔍)
GCVE (CVE): GCVE-0-2024-12844
GCVE (VulDB): GCVE-100-289080
scip Labs: https://www.scip.ch/en/?labs.20161013
Ukungena
Kudalwa: 2024-12-20 13:41Ukuvuselelwa: 2025-02-16 20:54
Ukulungiswa: 2024-12-20 13:41 (55), 2024-12-21 01:52 (30), 2025-02-16 20:54 (3)
Kugcwele: 🔍
Umthumeli: jiashenghe
Cache ID: 253:0FE:103
Thumela
Yamukelwa
- Thumela #462465: emlog emlog pro 2.4.1 Cross-Site Scripting (XSS) (kusuka ku jiashenghe)
Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.
Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.