Last Modified: Sept. 20, 2023
A vulnerability classified as problematic has been found in Tongda OA 11.10. Affected is an unknown function of the file /general/ipanel/menu_code.php?MENU_TYPE=FAV. The manipulation of the argument OA_SUB_WINDOW leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239868.
Tweets last week: 0
Remaining steady
Yahoo results: 0
Remaining steady
Current EPSS Score: 0.00052
Remaining steady
Reddit Posts: 0
Remaining steady
Github Repos: 0
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Confidentiality: Low
Integrity: Low
Availability: None
Base Score: 6.1
Exploitability Score:
2.8
Impact Score: 2.7
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-79
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:tongda2000:tongda_oa:11.10:*:*:*:*:*:*:* Part: a Vendor: tongda2000 | Alle Schwachstellen für tongda2000 |
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:tongda2000:tongda_oa:11.10:*:*:*:*:*:*:*
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:tongda2000:tongda_oa:11.10:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:tongda2000:tongda_oa:11.10:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>