CVE-2013-10024

A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.
References
Link Resource
https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16eda16ce93ac Patch
https://vuldb.com/?ctiid.225265 Permissions Required Third Party Advisory
https://vuldb.com/?id.225265 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:exit_strategy_project:exit_strategy:1.55:*:*:*:*:wordpress:*:*

History

07 Nov 2023, 02:14

Type Values Removed Values Added
CWE CWE-200

20 Oct 2023, 06:15

Type Values Removed Values Added
CWE CWE-200
Summary A vulnerability has been found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability. A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.

17 Apr 2023, 13:50

Type Values Removed Values Added
CPE cpe:2.3:a:exit_strategy_project:exit_strategy:1.55:*:*:*:*:wordpress:*:*
First Time Exit Strategy Project exit Strategy
Exit Strategy Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://vuldb.com/?id.225265 - (MISC) https://vuldb.com/?id.225265 - Permissions Required, Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.225265 - (MISC) https://vuldb.com/?ctiid.225265 - Permissions Required, Third Party Advisory
References (MISC) https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16eda16ce93ac - (MISC) https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16eda16ce93ac - Patch

08 Apr 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-08 17:15

Updated : 2024-04-11 00:49


NVD link : CVE-2013-10024

Mitre link : CVE-2013-10024

CVE.ORG link : CVE-2013-10024


JSON object : View

Products Affected

exit_strategy_project

  • exit_strategy
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor