mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
137 lines
5.8 KiB
JSON
137 lines
5.8 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2014-125101",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The identifier of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "Es wurde eine Schwachstelle in Portfolio Gallery Plugin bis 1.1.8 f\u00fcr WordPress entdeckt. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion. Durch das Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.1.9 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 58ed88243e17df766036f4857041edaf358076d3 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-89 SQL Injection",
|
|
"cweId": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Portfolio Gallery Plugin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1.8"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.230085",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.230085"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.230085",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.230085"
|
|
},
|
|
{
|
|
"url": "https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "VulDB GitHub Commit Analyzer"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 6.5,
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
|
|
}
|
|
]
|
|
}
|
|
} |