Логотип exploitDog
bind:CVE-2025-24853
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-24853

Количество 4

Количество 4

ubuntu логотип

CVE-2025-24853

6 месяцев назад

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-24853

6 месяцев назад

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-24853

6 месяцев назад

A carefully crafted request when creating a header link using the wik ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rrff-chj9-w4c7

6 месяцев назад

Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-24853

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-24853

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-24853

A carefully crafted request when creating a header link using the wik ...

CVSS3: 7.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-rrff-chj9-w4c7

Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering

0%
Низкий
6 месяцев назад

Уязвимостей на страницу