sah-comp bienlein 跨网站请求伪造

sah-comp bienlein 中曾发现分类为棘手的漏洞。 此漏洞会影响某些未知进程。 手动调试的不合法输入可导致 跨网站请求伪造。 漏洞的CWE定义是 CWE-352。 此漏洞的脆弱性 2022-12-21公示人身份d7836a4f2b241e4745ede194f0f6fb47199cab6b、所提交。 分享公告的网址是github.com。 该漏洞被标识为CVE-2020-36622, 攻击可能起始于远程, 无技术细节可用。 没有可利用漏洞。 当前漏洞利用价值为美元大约是 $0-$5k。 它被宣布为未定义。 我们估计的零日攻击价值约为$0-$5k。 补丁名称为d7836a4f2b241e4745ede194f0f6fb47199cab6b。 错误修复程序下载地址为github.com, 建议采用一个补丁来修正此问题。 该漏洞被披露后,此前未曾发表过可能的缓解措施。

字段2022-12-21 19時38分2023-01-22 07時10分2023-01-22 07時16分
vendorsah-compsah-compsah-comp
namebienleinbienleinbienlein
cwe352 (跨网站请求伪造)352 (跨网站请求伪造)352 (跨网站请求伪造)
risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
identifierd7836a4f2b241e4745ede194f0f6fb47199cab6bd7836a4f2b241e4745ede194f0f6fb47199cab6bd7836a4f2b241e4745ede194f0f6fb47199cab6b
urlhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6bhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6bhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6b
name补丁补丁补丁
patch_named7836a4f2b241e4745ede194f0f6fb47199cab6bd7836a4f2b241e4745ede194f0f6fb47199cab6bd7836a4f2b241e4745ede194f0f6fb47199cab6b
patch_urlhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6bhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6bhttps://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6b
cveCVE-2020-36622CVE-2020-36622CVE-2020-36622
responsibleVulDBVulDBVulDB
date1671577200 (2022-12-21)1671577200 (2022-12-21)1671577200 (2022-12-21)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.44.44.4
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore4.14.14.1
cvss3_meta_basescore4.34.35.0
cvss3_meta_tempscore4.14.15.0
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1671577200 (2022-12-21)1671577200 (2022-12-21)
cve_nvd_summaryA vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability.A vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iH
cvss3_nvd_aN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss3_nvd_basescore6.5
cvss3_cna_basescore4.3

Interested in the pricing of exploits?

See the underground prices here!