{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125101","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-27T07:52:32.742Z","datePublished":"2023-05-28T12:31:03.410Z","dateUpdated":"2024-08-06T14:10:56.639Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T07:20:01.511Z"},"title":"Portfolio Gallery Plugin sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"Portfolio Gallery Plugin","versions":[{"version":"1.1.0","status":"affected"},{"version":"1.1.1","status":"affected"},{"version":"1.1.2","status":"affected"},{"version":"1.1.3","status":"affected"},{"version":"1.1.4","status":"affected"},{"version":"1.1.5","status":"affected"},{"version":"1.1.6","status":"affected"},{"version":"1.1.7","status":"affected"},{"version":"1.1.8","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The identifier of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in Portfolio Gallery Plugin bis 1.1.8 für WordPress entdeckt. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion. Durch das Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.1.9 vermag dieses Problem zu lösen. Der Patch wird als 58ed88243e17df766036f4857041edaf358076d3 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2014-09-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2014-09-19T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2023-05-27T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-21T13:18:25.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.230085","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.230085","tags":["signature","permissions-required"]},{"url":"https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.639Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230085","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230085","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3","tags":["patch","x_transferred"]}]}]}}