magic-fields Plugin har 1.7.1 ka WordPress RCCWP_CreateCustomFieldPage.php custom-group-id Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
5.1$0-$5k0.00

Gundumabayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin magic-fields Plugin har 1.7.1 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, RCCWP_CreateCustomFieldPage.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument custom-group-id as part of Parameter shi Cross Site Scripting. Wannan rauni ana sayar da shi da suna CVE-2017-18610. Ngam yiɗi ka a tuma ndiyam ka internet. Ba exploit ɗin da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Furɗebayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin magic-fields Plugin har 1.7.1 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, RCCWP_CreateCustomFieldPage.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument custom-group-id as part of Parameter shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi 09/10/2019.

Wannan rauni ana sayar da shi da suna CVE-2017-18610. CVE assignement 09/10/2019 gangan shikena. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal bayani ga. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k.

Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Kayanbayani

Nganji

Sunu

Furɗe

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 5.2
VulDB Meta Temp Score: 5.1

VulDB Ganda Borno: 4.3
VulDB Temp Score: 4.1
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 6.1
NVD Furɗo: 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

0-Day Gana: 🔍

Gargajiya: magic-fields Plugin 1.7.2

Waktin layibayani

09/10/2019 🔍
09/10/2019 +0 Hənde 🔍
09/11/2019 +1 Hənde 🔍
12/19/2023 +1560 Hənde 🔍

Ngizimbayani

Gargaaji: sumofpwn.nl
Halitta: A wondi feere

CVE: CVE-2017-18610 (🔍)
GCVE (CVE): GCVE-0-2017-18610
GCVE (VulDB): GCVE-100-141515
Gana kuma: 🔍

Gumtibayani

Súgá: 09/11/2019 07:02
Gargadi: 12/19/2023 07:50
Gada duplikat: 🔍
Goyarwa: 09/11/2019 07:02 (40), 08/18/2020 17:40 (18), 06/19/2022 17:57 (3), 12/19/2023 07:50 (2)
Gadankam: 🔍
Cache ID: 253:933:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!