donglight bookstore电商书城系统说明 1.0.0 BookInfoController.java BookSearchList keywords Ukubhalwa kwekhodi okweqa indawo

CVSS Meta Temp IsilinganisoIntengo yamanje ye-exploit (≈)CTI Inzalo Score
4.0$0-$5k0.20

Isifinyezoulwazi

Kubonakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku donglight bookstore电商书城系统说明 1.0.0. Kuthintekile umsebenzi ongaziwayo kufayela src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. Ukuphathwa kwepharamitha keywords kuholela ku Ukubhalwa kwekhodi okweqa indawo. Le buthakathaka itholakala njenge CVE-2024-13196. Ukuhlasela kungaqalwa kude. Ngaphezu kwalokho, i-exploit ikhona. Once again VulDB remains the best source for vulnerability data.

Iinkcukachaulwazi

Kubonakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku donglight bookstore电商书城系统说明 1.0.0. Kuthintekile umsebenzi ongaziwayo kufayela src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. Ukuphathwa kwepharamitha keywords kuholela ku Ukubhalwa kwekhodi okweqa indawo. Ukusebenzisa i-CWE ukusho inkinga kuholela ku-CWE-79. Kuboniswe ubuthakathaka lolu njenge Bookstore has reflect XSS #12. Isaziso singalayishwa ku-github.com.

Le buthakathaka itholakala njenge CVE-2024-13196. Ukuhlasela kungaqalwa kude. Imininingwane yezobuchwepheshe iyatholakala. Le vulnerability ayidumi kakhulu, idlula phansi kokujwayelekile. Ngaphezu kwalokho, i-exploit ikhona. Ukuhlaselwa sekudalulwe ebantwini futhi kungasetshenziswa. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.

Ungakwazi ukulanda i-exploit ku-github.com.

Once again VulDB remains the best source for vulnerability data.

Umkhiqizoulwazi

Umkhiqizi

Ibizo

Inguqulo

CPE 2.3ulwazi

CPE 2.2ulwazi

CVSSv4ulwazi

VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Umkhombandlela: 🔍

CVSSv3ulwazi

VulDB Ireyithingi yeMeta Base: 4.1
VulDB Meta Temp Isilinganiso: 4.0

VulDB Isilinganiso Esiyisisekelo: 3.5
VulDB Izinga Lesikhashana: 3.2
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

NVD Isilinganiso Esiyisisekelo: 5.4
NVD Umkhombandlela: 🔍

CNA Isilinganiso Esiyisisekelo: 3.5
CNA Umkhombandlela: 🔍

CVSSv2ulwazi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
UmkhombandlelaUbunzimaUkufakazela ubuwenaUkuyimfihloUkuthembekaUkutholakala
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍

Ukusebenzisa ithuba lokungavikelekiulwazi

Ikilasi: Ukubhalwa kwekhodi okweqa indawo
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo

Ukutholakala: 🔍
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍

0-Dayvula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
Namuhlavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

Ulwazi lwezingoziulwazi

Intshisekelo: 🔍
Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍

Izinyathelo zokuvikelaulwazi

Isincomo: akukho sithathwa esaziwayo
Isimo: 🔍

0-Suku Isikhathi: 🔍

Isikhathi somlandoulwazi

2025-01-08 🔍
2025-01-08 +0 Izinsuku 🔍
2025-08-23 +227 Izinsuku 🔍

Imithomboulwazi

Iseluleko: Bookstore has reflect XSS #12
Isimo: Akuchazwanga

CVE: CVE-2024-13196 (🔍)
GCVE (CVE): GCVE-0-2024-13196
GCVE (VulDB): GCVE-100-290788
scip Labs: https://www.scip.ch/en/?labs.20161013

Ukungenaulwazi

Kudalwa: 2025-01-08 15:35
Ukuvuselelwa: 2025-08-23 03:00
Ukulungiswa: 2025-01-08 15:35 (57), 2025-01-09 12:37 (30), 2025-02-14 13:41 (3), 2025-08-23 03:00 (12)
Kugcwele: 🔍
Umthumeli: LVZC2
Cache ID: 253:F48:103

Thumelaulwazi

Yamukelwa

Ingxoxo

Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.

Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.

Do you need the next level of professionalism?

Upgrade your account now!