Логотип exploitDog
bind:CVE-2024-0975
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-0975

Количество 2

Количество 2

nvd логотип

CVE-2024-0975

почти 2 года назад

The WordPress Access Control plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.13 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "Make Website Members Only" feature (when unset) and view restricted page and post content.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-f3hc-4jf7-hp4h

почти 2 года назад

The WordPress Access Control plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.13 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "Make Website Members Only" feature (when unset) and view restricted page and post content.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-0975

The WordPress Access Control plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.13 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "Make Website Members Only" feature (when unset) and view restricted page and post content.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-f3hc-4jf7-hp4h

The WordPress Access Control plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.13 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "Make Website Members Only" feature (when unset) and view restricted page and post content.

CVSS3: 5.3
0%
Низкий
почти 2 года назад

Уязвимостей на страницу