diff --git a/2014/125xxx/CVE-2014-125102.json b/2014/125xxx/CVE-2014-125102.json index bf60dc0e016..0174c9e2dd8 100644 --- a/2014/125xxx/CVE-2014-125102.json +++ b/2014/125xxx/CVE-2014-125102.json @@ -1,17 +1,133 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2014-125102", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in Bestwebsoft Relevant Plugin up to 1.0.7 on WordPress. Affected by this vulnerability is an unknown functionality of the component Thumbnail Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.0.8 is able to address this issue. The name of the patch is 860d1891025548cf0f5f97364c1f51a888f523c3. It is recommended to upgrade the affected component. The identifier VDB-230113 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In Bestwebsoft Relevant Plugin bis 1.0.7 f\u00fcr WordPress wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Komponente Thumbnail Handler. Durch Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.0.8 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 860d1891025548cf0f5f97364c1f51a888f523c3 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Disclosure", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Bestwebsoft", + "product": { + "product_data": [ + { + "product_name": "Relevant Plugin", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0.0" + }, + { + "version_affected": "=", + "version_value": "1.0.1" + }, + { + "version_affected": "=", + "version_value": "1.0.2" + }, + { + "version_affected": "=", + "version_value": "1.0.3" + }, + { + "version_affected": "=", + "version_value": "1.0.4" + }, + { + "version_affected": "=", + "version_value": "1.0.5" + }, + { + "version_affected": "=", + "version_value": "1.0.6" + }, + { + "version_affected": "=", + "version_value": "1.0.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.230113", + "refsource": "MISC", + "name": "https://vuldb.com/?id.230113" + }, + { + "url": "https://vuldb.com/?ctiid.230113", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.230113" + }, + { + "url": "https://github.com/wp-plugins/relevant/commit/860d1891025548cf0f5f97364c1f51a888f523c3", + "refsource": "MISC", + "name": "https://github.com/wp-plugins/relevant/commit/860d1891025548cf0f5f97364c1f51a888f523c3" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseSeverity": "MEDIUM" } ] }