quotes-collection Plugin up to 2.0.5 on WordPress admin.php page cross site scripting – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on September 14th, 2019 📆 | 6260 Views ⚑


quotes-collection Plugin up to 2.0.5 on WordPress admin.php page cross site scripting

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in quotes-collection Plugin up to 2.0.5 on WordPress (WordPress Plugin). It has been classified as problematic. Affected is some unknown processing of the file wp-admin/admin.php?page=quotes-collection. The manipulation of the argument page as part of a Parameter leads to a cross site scripting vulnerability. CWE is classifying the issue as CWE-80. This is going to have an impact on integrity. An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and would make it possible to initiate further attacks against site visitors.

The weakness was released 09/13/2019. This vulnerability is traded as CVE-2016-10952 since 09/12/2019. It is possible to launch the attack remotely. There are known technical details, but no exploit is available.

Upgrading to version 2.0.6 eliminates this vulnerability.



VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Cross site scripting (CWE-80)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: quotes-collection Plugin 2.0.6

09/12/2019 CVE assigned
09/13/2019 +1 days Advisory disclosed
09/14/2019 +1 days VulDB entry created
09/14/2019 +0 days VulDB last update
CVE: CVE-2016-10952 (🔒)Created: 09/14/2019 09:13 AM
Complete: 🔍


No comments yet. Please log in to comment.

Enable the mail alert feature now!


Tagged with:

Leave a Reply ✍

Back to Top ↑