mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
142 lines
5.6 KiB
JSON
142 lines
5.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-6252",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability has been found in Zorlan SkyCaiji up to 2.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Task Handler. The manipulation of the argument onerror leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269419."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "In Zorlan SkyCaiji bis 2.8 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Komponente Task Handler. Durch das Manipulieren des Arguments onerror mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79 Cross Site Scripting",
|
|
"cweId": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Zorlan",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SkyCaiji",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.8"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.269419",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.269419"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.269419",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.269419"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?submit.355783",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?submit.355783"
|
|
},
|
|
{
|
|
"url": "https://fushuling.com/index.php/2024/06/13/test2/",
|
|
"refsource": "MISC",
|
|
"name": "https://fushuling.com/index.php/2024/06/13/test2/"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "fushuling (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 2.4,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
|
"baseSeverity": "LOW"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 2.4,
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
|
"baseSeverity": "LOW"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 3.3,
|
|
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
|
|
}
|
|
]
|
|
}
|
|
} |