Дата публикации: | 11.05.2021 |
Всего просмотров: | 414 |
Опасность: | Низкая |
Наличие исправления: | Да |
Количество уязвимостей: | 1 |
CVSSv3.1 рейтинг: | 4.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C] |
CVE ID: | Нет данных |
Вектор эксплуатации: | Удаленная |
Воздействие: |
Межсайтовый скриптинг Обход ограничений безопасности |
CWE ID: | Нет данных |
Наличие эксплоита: | Нет данных |
Уязвимые продукты: | Joplin Web Clipper |
Уязвимые версии: | Joplin версии 1.8.4, 1.8.3, 1.8.2, 1.8.1, 1.7.11, 1.7.10, 1.7.8, 1.7.9, 1.7.7, 1.7.6, 1.7.5, 1.7.4, 1.6.8, 1.7.1, 1.7.2, 1.7.3, 1.6.7, 1.6.6, 1.6.5, 1.6.3, 1.6.4, 1.6.2, 1.5.14, 1.6.1, 1.5.13, 1.5.12, 1.5.11, 1.5.10, 1.5.9, 1.5.8, 1.5.7, 1.5.6, 1.5.5, 1.5.4, 1.4.19, 1.5.3, 1.5.2, 1.5.1, 1.4.18, 1.4.16, 1.4.14, 1.4.15, 1.4.13, 1.4.12, 1.4.11, 1.4.10, 1.4.9, 1.4.8, 1.4.7, 1.3.18, 1.3.16, 1.3.17, 1.4.5, 1.4.6, 1.4.4, 1.4.2, 1.4.3, 1.4.1, 1.3.12, 1.3.14, 1.3.15, 1.3.11, 1.3.10, 1.3.9, 1.3.8, 1.3.7, 1.3.6, 1.3.4, 1.3.5, 1.3.3, 1.3.2, 1.3.1, 1.2.5, 1.2.6, 1.2.4, 1.2.3, 1.2.2, 1.2.1, 1.1.4, 1.1.3, 1.1.2, 1.1.1, 1.0.245, 1.0.243, 1.1.244, 1.0.242, 1.0.241, 1.0.240, 1.0.238, 1.0.239, 1.0.237, 1.0.236, 1.0.235, 1.0.234, 1.0.233, 1.0.232, 1.0.230, 1.0.231, 1.0.229, 1.0.228, 1.0.227, 1.0.226, 1.0.225, 1.0.224, 1.0.222, 1.0.223, 1.0.221, 1.0.219, 1.0.220, 1.0.218, 1.0.217, 1.0.208, 1.0.209, 1.0.210, 1.0.211, 1.0.212, 1.0.213, 1.0.214, 1.0.215, 1.0.216, 1.0.207, 1.0.206, 1.0.205, 1.0.204, 1.0.203, 1.0.202, 1.0.201, 1.0.200, 1.0.199, 1.0.198, 1.0.197, 1.0.196, 1.0.195, 1.0.194, 1.0.193, 1.0.192, 1.0.191, 1.0.190, 1.0.189, 1.0.188, 1.0.187, 1.0.186, 1.0.185, 1.0.184, 1.0.183, 1.0.182, 1.0.181, 1.0.180, 1.0.179, 1.0.178, 1.0.177, 1.0.176, 1.0.175, 1.0.174, 1.0.173, 1.0.172, 1.0.171, 1.0.170, 1.0.169, 1.0.168, 1.0.167, 1.0.166, 1.0.165, 1.0.164, 1.0.163, 1.0.162, 1.0.161, 1.0.160, 1.0.159, 1.0.158, 1.0.157, 1.0.156, 1.0.155, 1.0.154, 1.0.153, 1.0.152, 1.0.151, 1.0.150, 1.0.149, 1.0.148, 1.0.147, 1.0.146, 1.0.145, 1.0.144, 1.0.143, 1.0.142, 1.0.141, 1.0.140, 1.0.139, 1.0.138, 1.0.137, 1.0.136, 1.0.135, 1.0.134, 1.0.133, 1.0.132, 1.0.131, 1.0.130, 1.0.129, 1.0.128, 1.0.127, 1.0.126, 1.0.125, 1.0.124, 1.0.123, 1.0.120, 1.0.119, 1.0.118, 1.0.117, 1.0.116, 1.0.115, 1.0.114, 1.0.113, 1.0.112, 1.0.111, 1.0.110, 1.0.109, 1.0.108, 1.0.107, 1.0.106, 1.0.105, 1.0.104, 1.0.103, 1.0.102, 1.0.101, 1.0.100, 1.0.99, 1.0.98, 1.0.97, 1.0.96, 1.0.95, 1.0.94, 1.0.93, 1.0.92, 1.0.91, 1.0.90, 1.0.89, 1.0.88, 1.0.87, 1.0.86, 1.0.85, 1.0.84, 1.0.83, 1.0.82, 1.0.81, 1.0.80, 1.0.79, 1.0.78, 1.0.77, 1.0.76, 1.0.75, 1.0.74, 1.0.73, 1.0.72, 1.0.71, 1.0.70, 1.0.69, 1.0.68, 1.0.67, 1.0.66, 1.0.65, 1.0.64, 1.0.63, 1.0.62 |
Описание: | Межсайтовый скриптинг в Joplin |
URL производителя: |
https://joplinapp.org/ |
Решение: | Установите исправление с сайта производителя. |
Ссылки: | https://www.cybersecurity-help.cz/vdb/SB2021051102 |