{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125093","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-08T18:27:08.216Z","datePublished":"2023-03-10T02:00:04.754Z","dateUpdated":"2024-08-06T14:10:56.616Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T07:10:15.630Z"},"title":"Ad Blocking Detector Plugin ad-blocking-detector.php information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"CWE-200 Information Disclosure"}]}],"affected":[{"vendor":"n/a","product":"Ad Blocking Detector Plugin","versions":[{"version":"1.2.0","status":"affected"},{"version":"1.2.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The patch is identified as 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In Ad Blocking Detector Plugin bis 1.2.1 für WordPress wurde eine problematische Schwachstelle gefunden. Es geht um eine nicht näher bekannte Funktion der Datei ad-blocking-detector.php. Durch die Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.2.2 vermag dieses Problem zu lösen. Der Patch wird als 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-03-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-08T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-01T21:32:25.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.222610","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.222610","tags":["signature","permissions-required"]},{"url":"https://github.com/wp-plugins/ad-blocking-detector/commit/3312b9cd79e5710d1e282fc9216a4e5ab31b3d94","tags":["patch"]},{"url":"https://github.com/wp-plugins/ad-blocking-detector/releases/tag/1.2.2","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.616Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.222610","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.222610","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/wp-plugins/ad-blocking-detector/commit/3312b9cd79e5710d1e282fc9216a4e5ab31b3d94","tags":["patch","x_transferred"]},{"url":"https://github.com/wp-plugins/ad-blocking-detector/releases/tag/1.2.2","tags":["patch","x_transferred"]}]}]}}