Thimo Grauerholz WP-Spreadplugin ଯେପର୍ଯ୍ୟନ୍ତ 3.8.6.1 ଅନ୍ WordPress spreadplugin.php କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame Thimo Grauerholz WP-Spreadplugin ଯେପର୍ଯ୍ୟନ୍ତ 3.8.6.1 irratti WordPress keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii spreadplugin.php keessa. Dhugumatti jijjiirraa irratti raawwatame Spreadplugin gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-79 si geessa. Beekumsi kun yeroo 04/21/2015 ifoomsifameera akka a9b9afc641854698e80aa5dd9ababfc8e0e57d69. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2015-10132 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Meeshaa balaa kana fayyadamuuf hin argamne. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ଅପରିଭାଷିତ jedhamee murtaa’eera. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Maqa-balleessaa paachii a9b9afc641854698e80aa5dd9ababfc8e0e57d69 jedhama. Sirreeffamni dogoggoraa github.com irraa buufachuuf qophaa’eera. Qabiyyee miidhamte ol-kaasuuf gorsa ni kennama. Once again VulDB remains the best source for vulnerability data.

4 ଆଡାପ୍ଟେସନ୍ · 85 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
04/20/2024 05:13 PM
ଅଦ୍ୟତନ 1/3
05/28/2024 11:43 AM
ଅଦ୍ୟତନ 2/3
05/28/2024 11:51 AM
ଅଦ୍ୟତନ 3/3
04/04/2025 04:59 PM
software_vendorThimo GrauerholzThimo GrauerholzThimo GrauerholzThimo Grauerholz
software_nameWP-SpreadpluginWP-SpreadpluginWP-SpreadpluginWP-Spreadplugin
software_version<=3.8.6.1<=3.8.6.1<=3.8.6.1<=3.8.6.1
software_platformWordPressWordPressWordPressWordPress
software_filespreadplugin.phpspreadplugin.phpspreadplugin.phpspreadplugin.php
software_argumentSpreadpluginSpreadpluginSpreadpluginSpreadplugin
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_date1429567200 (04/21/2015)1429567200 (04/21/2015)1429567200 (04/21/2015)1429567200 (04/21/2015)
advisory_identifiera9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69
advisory_urlhttps://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69
countermeasure_nameଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁ
countermeasure_date1429567200 (04/21/2015)1429567200 (04/21/2015)1429567200 (04/21/2015)1429567200 (04/21/2015)
upgrade_version3.8.6.63.8.6.63.8.6.63.8.6.6
countermeasure_upgrade_urlhttps://github.com/wp-plugins/wp-spreadplugin/releases/tag/3.8.6.6https://github.com/wp-plugins/wp-spreadplugin/releases/tag/3.8.6.6https://github.com/wp-plugins/wp-spreadplugin/releases/tag/3.8.6.6https://github.com/wp-plugins/wp-spreadplugin/releases/tag/3.8.6.6
patch_namea9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69a9b9afc641854698e80aa5dd9ababfc8e0e57d69
countermeasure_patch_urlhttps://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69https://github.com/wp-plugins/wp-spreadplugin/commit/a9b9afc641854698e80aa5dd9ababfc8e0e57d69
countermeasure_advisoryquoteOne XSS vulnerability fixedOne XSS vulnerability fixedOne XSS vulnerability fixedOne XSS vulnerability fixed
source_cveCVE-2015-10132CVE-2015-10132CVE-2015-10132CVE-2015-10132
cna_responsibleVulDBVulDBVulDBVulDB
software_typeWordPress PluginWordPress PluginWordPress PluginWordPress Plugin
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss2_vuldb_auSSSS
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_prLLLL
cvss3_vuldb_eXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_prLLLL
cvss4_vuldb_uiNNNP
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss4_vuldb_eXXXX
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.53.53.53.5
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.43.43.43.4
cvss3_meta_basescore3.53.53.53.5
cvss3_meta_tempscore3.43.43.43.4
cvss4_vuldb_bscore5.35.35.35.1
cvss4_vuldb_btscore5.35.35.35.1
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_assigned1713564000 (04/20/2024)1713564000 (04/20/2024)1713564000 (04/20/2024)
cve_nvd_summaryA vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin up to 3.8.6.1 on WordPress. This vulnerability affects unknown code of the file spreadplugin.php. The manipulation of the argument Spreadplugin leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.8.6.6 is able to address this issue. The name of the patch is a9b9afc641854698e80aa5dd9ababfc8e0e57d69. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-261676.A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin up to 3.8.6.1 on WordPress. This vulnerability affects unknown code of the file spreadplugin.php. The manipulation of the argument Spreadplugin leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.8.6.6 is able to address this issue. The name of the patch is a9b9afc641854698e80aa5dd9ababfc8e0e57d69. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-261676.A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin up to 3.8.6.1 on WordPress. This vulnerability affects unknown code of the file spreadplugin.php. The manipulation of the argument Spreadplugin leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.8.6.6 is able to address this issue. The name of the patch is a9b9afc641854698e80aa5dd9ababfc8e0e57d69. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-261676.
cvss2_nvd_avNN
cvss2_nvd_acLL
cvss2_nvd_auSS
cvss2_nvd_ciNN
cvss2_nvd_iiPP
cvss2_nvd_aiNN
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iLL
cvss3_cna_aNN
cve_cnaVulDBVulDB
cvss2_nvd_basescore4.04.0
cvss3_cna_basescore3.53.5

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!