// For flags

CVE-2015-10028

ss15-this-is-sparta Main Page roomElement.js cross site scripting

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been found in ss15-this-is-sparta and classified as problematic. This vulnerability affects unknown code of the file js/roomElement.js of the component Main Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is ba2f71ad3a46e5949ee0c510b544fa4ea973baaa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217624.

Se ha encontrado una vulnerabilidad en ss15-this-is-sparta y se ha clasificado como problemática. Esta vulnerabilidad afecta a un código desconocido del archivo js/roomElement.js del componente Main Page, que con su manipulación puede derivar en un cross site scripting. El ataque se puede iniciar de forma remota. El nombre del parche es ba2f71ad3a46e5949ee0c510b544fa4ea973baaa. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217624.

In ss15-this-is-sparta wurde eine problematische Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Datei js/roomElement.js der Komponente Main Page. Dank der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Patch wird als ba2f71ad3a46e5949ee0c510b544fa4ea973baaa bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.

*Credits: VulDB GitHub Commit Analyzer
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-07 CVE Reserved
  • 2023-01-07 CVE Published
  • 2024-07-30 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pear Programming Project
Search vendor "Pear Programming Project"
Pear Programming
Search vendor "Pear Programming Project" for product "Pear Programming"
< 2015-02-08
Search vendor "Pear Programming Project" for product "Pear Programming" and version " < 2015-02-08"
-
Affected