CVE-2013-10010

A vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007.
References
Link Resource
https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273 Patch Third Party Advisory
https://vuldb.com/?ctiid.218007 Permissions Required Third Party Advisory
https://vuldb.com/?id.218007 Permissions Required Third Party Advisory
https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273 Patch Third Party Advisory
https://vuldb.com/?ctiid.218007 Permissions Required Third Party Advisory
https://vuldb.com/?id.218007 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zerochplus_project:zerochplus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:48

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en zerochplus y se ha clasificado como problemática. Esto afecta a la función PrintResList del archivo test/mordor/thread.res.pl. La manipulación conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El parche se llama 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218007.
CVSS v2 : 5.0
v3 : 6.1
v2 : 5.0
v3 : 4.3
References () https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273 - Patch, Third Party Advisory () https://github.com/zerochplus/zerochplus/commit/9ddf9ecca8565341d8d26a3b2f64540bde4fa273 - Patch, Third Party Advisory
References () https://vuldb.com/?ctiid.218007 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.218007 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.218007 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.218007 - Permissions Required, Third Party Advisory

12 Oct 2023, 09:15

Type Values Removed Values Added
Summary A vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007. A vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007.

Information

Published : 2023-01-11 16:15

Updated : 2024-11-21 01:48


NVD link : CVE-2013-10010

Mitre link : CVE-2013-10010

CVE.ORG link : CVE-2013-10010


JSON object : View

Products Affected

zerochplus_project

  • zerochplus
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')