CNA 2012

VulDB is an officially certified CVE Numbering Authority (CNA) by MITRE and Authorized Data Publisher (ADP) by NIST NVD. We are authorized to handle new vulnerability submissions, assign unique CVEs and disclose them. CVE is an international program to discover vulnerabilities which are then assigned and published to the CVE list. Partners coordinate such CVE entries to communicate consistent descriptions. Information technology and cybersecurity professionals all around the world use CVE records to ensure they are discussing the same issues, and to coordinate their efforts to prioritize and address these properly.

Vendor

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product

Kau-Boy Backend Localization Plugin2
ahmyi RivetTracker2
BestWebSoft Portfolio Plugin1
Halulu simple-download-button-shortcode Plugin1
BestWebSoft Twitter Plugin1

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix16
Temporary Fix0
Workaround0
Unavailable0
Not Defined0

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High0
Functional0
Proof-of-Concept1
Unproven0
Not Defined15

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical0
Local0
Adjacent1
Network15

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High0
Low11
None5

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required11
None5

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

VulDB

≤10
≤20
≤30
≤47
≤55
≤61
≤72
≤81
≤90
≤100

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

Exploit 0-day

<1k0
<2k16
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

IDVulnerabilityScopeResponsibleSubmissionCreatedUpdatedCVESubmitCNA
248955BestWebSoft Portfolio Plugin cross-site request forgeryVulDBVulDB12/24/202301/18/2024CVE-2012-10017
 
accepted
242190Halulu simple-download-button-shortcode Plugin Download simple-download-button_dl.php information disclosureVulDBVulDB10/15/202311/02/2023CVE-2012-10016
 
accepted
230154BestWebSoft Twitter Plugin Settings Page twitter.php twttr_settings_page cross-site request forgeryVulDBVulDB05/29/202306/21/2023CVE-2012-10015
 
accepted
227232Kau-Boy Backend Localization Plugin backend_localization.php localize_backend cross site scriptingVulDBVulDB04/22/202305/18/2023CVE-2012-10014
 
accepted
227231Kau-Boy Backend Localization Plugin backend_localization.php cross site scriptingVulDBVulDB04/22/202305/18/2023CVE-2012-10013
 
accepted
225355BestWebSoft Facebook Like Button facebook-button-plugin.php fcbk_bttn_plgn_settings_page cross-site request forgeryVulDBVulDB04/08/202304/26/2023CVE-2012-10012
 
accepted
225350HD FLV PLayer Plugin functions.php hd_update_media sql injectionVulDBVulDB04/08/202304/26/2023CVE-2012-10011
 
accepted
225321BestWebSoft Contact Form contact_form.php cntctfrm_settings_page cross-site request forgeryVulDBVulDB04/07/202304/26/2023CVE-2012-10010
 
accepted
223404404like Plugin 404Like.php checkPage sql injectionVulDBVulDB03/19/202304/12/2023CVE-2012-10009
 
accepted
221483uakfdotb oneapp sql injectionVulDBVulDB02/18/202303/23/2023CVE-2012-10008
 
accepted
221479madgicweb BuddyStream Plugin ShareBox.php cross site scriptingVulDBVulDB02/18/202303/23/2023CVE-2012-10007
 
accepted
218493ale7714 sigeprosi sql injectionVulDBVulDB01/17/202302/09/2023CVE-2012-10006
 
accepted
218155manikandan170890 php-form-builder-class Textarea Textarea.php cross site scriptingVulDBVulDB01/12/202302/05/2023CVE-2012-10005
 
accepted
217950backdrop-contrib Basic Cart basic_cart.cart.inc basic_cart_checkout_form_submit cross site scriptingVulDBVulDB01/11/202302/01/2023CVE-2012-10004
 
accepted
217271ahmyi RivetTracker cross site scriptingVulDBVulDB01/03/202301/27/2023CVE-2012-10003
 
accepted
217267ahmyi RivetTracker css.php changeColor cross site scriptingVulDBVulDB01/03/202301/27/2023CVE-2012-10002
 
accepted

Want to stay up to date on a daily basis?

Enable the mail alert feature now!