A vulnerability classified as problematic has been found in ethitter WP-Print-Friendly up to 0.5.2. This affects an unknown part of the file wp-print-friendly.php. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. Upgrading to version 0.5.3 is able to address this issue. The identifier of the patch is 437787292670c20b4abe20160ebbe8428187f2b4. It is recommended to upgrade the affected component. The identifier VDB-217269 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/ethitter/WP-Print-Friendly/commit/437787292670c20b4abe20160ebbe8428187f2b4 | Patch Third Party Advisory |
https://github.com/ethitter/WP-Print-Friendly/pull/4 | Patch Third Party Advisory |
https://vuldb.com/?ctiid.217269 | Third Party Advisory |
https://vuldb.com/?id.217269 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-01-03T10:56:25.721Z
Updated: 2023-10-12T08:51:18.660Z
Reserved: 2023-01-03T10:54:57.399Z
Link: CVE-2013-10007
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-03T11:15:09.987
Modified: 2024-05-17T00:54:44.573
Link: CVE-2013-10007
JSON object: View
Redhat Information
No data.