Portfolio Gallery Plugin har 1.1.8 ka WordPress SQL Injection

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin Portfolio Gallery Plugin har 1.1.8 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi SQL Injection. CWE shidin ka a yi bayani matsala sai ya kai CWE-89. Gaskiya, laifi an fitar da shi 09/19/2014 a matsayin 58ed88243e17df766036f4857041edaf358076d3. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2014-125101. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal bayani ba ga. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Patch ɗin sunan ganowa shine 58ed88243e17df766036f4857041edaf358076d3. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 Goyarwa · 46 Datenpunkte

FurɗeSúgá
05/27/2023 09:58
Gargadi 1/1
06/21/2023 13:18
software_namePortfolio Gallery PluginPortfolio Gallery Plugin
software_version<=1.1.8<=1.1.8
software_platformWordPressWordPress
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_rlOO
cvss3_vuldb_rcCC
advisory_date1411077600 (09/19/2014)1411077600 (09/19/2014)
advisory_identifier58ed88243e17df766036f4857041edaf358076d358ed88243e17df766036f4857041edaf358076d3
advisory_urlhttps://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3
countermeasure_nameGargajiyaGargajiya
countermeasure_date1411077600 (09/19/2014)1411077600 (09/19/2014)
upgrade_version1.1.91.1.9
patch_name58ed88243e17df766036f4857041edaf358076d358ed88243e17df766036f4857041edaf358076d3
countermeasure_patch_urlhttps://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3
countermeasure_advisoryquoteSQL Injection bag has fixed in Portfolio GallerySQL Injection bag has fixed in Portfolio Gallery
source_cveCVE-2014-125101CVE-2014-125101
cna_responsibleVulDBVulDB
software_typePhoto Gallery SoftwarePhoto Gallery Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_rcCC
cvss2_vuldb_rlOFOF
cvss2_vuldb_auSS
cvss2_vuldb_eNDND
cvss3_vuldb_prLL
cvss3_vuldb_eXX
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.75.7
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore6.06.0
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore6.06.0
price_0day$0-$5k$0-$5k
cve_assigned1685138400 (05/27/2023)
cve_nvd_summaryA vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The name of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability.

Might our Artificial Intelligence support you?

Check our Alexa App!