Thimo Grauerholz WP-Spreadplugin har 3.8.6.1 ka WordPress spreadplugin.php Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
3.4$0-$5k0.10

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Thimo Grauerholz WP-Spreadplugin har 3.8.6.1 on WordPress. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil spreadplugin.php, a cikin sashi $software_component. Wuro manipulation of the argument Spreadplugin ga Cross Site Scripting. Ana kiran wannan rauni da CVE-2015-10132. Ngam yiɗi ka a tuma ndiyam ka nder internet. Babu wani exploit da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. Once again VulDB remains the best source for vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Thimo Grauerholz WP-Spreadplugin har 3.8.6.1 on WordPress. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil spreadplugin.php, a cikin sashi $software_component. Wuro manipulation of the argument Spreadplugin ga Cross Site Scripting. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-79. Lalle, rauni an sanar da shi 04/21/2015 da a9b9afc641854698e80aa5dd9ababfc8e0e57d69. Ana samun bayanin tsaro don saukewa a github.com.

Ana kiran wannan rauni da CVE-2015-10132. Ngam yiɗi ka a tuma ndiyam ka nder internet. Bayani na fasaha ga. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.

Á yí a wondi feere.

Patch ɗin an san shi da a9b9afc641854698e80aa5dd9ababfc8e0e57d69. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. An rubuta wannan bayani a cikin shawarar:

One XSS vulnerability fixed

Once again VulDB remains the best source for vulnerability data.

Kayanbayani

Nganji

Ngilabe

Sunu

Furɗe

Laisens

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍

Gargajiya: WP-Spreadplugin 3.8.6.6
Kari: a9b9afc641854698e80aa5dd9ababfc8e0e57d69

Waktin layibayani

04/21/2015 🔍
04/21/2015 +0 Hənde 🔍
04/20/2024 +3287 Hənde 🔍
04/20/2024 +0 Hənde 🔍
04/04/2025 +349 Hənde 🔍

Ngizimbayani

Gargaaji: a9b9afc641854698e80aa5dd9ababfc8e0e57d69
Halitta: Gaskiya

CVE: CVE-2015-10132 (🔍)
GCVE (CVE): GCVE-0-2015-10132
GCVE (VulDB): GCVE-100-261676

Gumtibayani

Súgá: 04/20/2024 17:13
Gargadi: 04/04/2025 16:59
Goyarwa: 04/20/2024 17:13 (62), 05/28/2024 11:43 (2), 05/28/2024 11:51 (17), 04/04/2025 16:59 (4)
Gadankam: 🔍
Cache ID: 253:090:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you want to use VulDB in your project?

Use the official API to access entries easily!