Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rc65-2j52-4wcg

Опубликовано: 05 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 21%
0.00067
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-913

Связанные уязвимости

CVSS3: 6.3
nvd
2 месяца назад

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 21%
0.00067
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-913