HCL Digital Experience Error Response cross site scripting

A vulnerability classified as problematic has been found in HCL Digital Experience (the affected version unknown). This affects an unknown function of the component Error Response Handler. Applying a patch is able to eliminate this problem.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

130

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%39
50%10

Approve Conf

90%39
80%10
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302353109/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302353009/23/2022VulD...cvss3_meta_tempscore3.6see CVSS documentation09/23/2022accepted
90
1302352909/23/2022VulD...cvss3_meta_basescore3.7see CVSS documentation09/23/2022accepted
90
1302352809/23/2022VulD...cvss3_vuldb_tempscore4.1see CVSS documentation09/23/2022accepted
90
1302352709/23/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation09/23/2022accepted
90
1302352609/23/2022VulD...cvss2_vuldb_tempscore4.4see CVSS documentation09/23/2022accepted
90
1302352509/23/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation09/23/2022accepted
90
1302352409/23/2022VulD...cvss3_cna_basescore3.1see CVSS documentation09/23/2022accepted
90
1302352309/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302352209/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302352109/23/2022VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector09/23/2022accepted
80
1302352009/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/23/2022accepted
80
1302351909/23/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector09/23/2022accepted
80
1302351809/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302351709/23/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector09/23/2022accepted
80
1302351609/23/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector09/23/2022accepted
80
1302351509/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302351409/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302351309/23/2022VulD...date1663884000 (09/23/2022)09/23/2022accepted
90
1302351209/23/2022VulD...cve_nvd_summaryUser input included in error response, which could be used in a phishing attack.cve.org09/23/2022accepted
90

29 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!