vulners.com
Open in
urlscan Pro
104.22.52.212
Public Scan
URL:
https://vulners.com/cve/CVE-2024-10924
Submission: On December 05 via api from IN — Scanned from DE
Submission: On December 05 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Lucene search * Basic search * Lucene search * Search by product -------------------------------------------------------------------------------- Subscribe CTRLK Start 30-day trial Database Vendors Products Years CVSS Scanner Agent Scanning API Scanning Manual Audit Perimeter Scanner Scanning Projects Email Webhook Plugins Resources Documents Blog Glossary FAQ Pricing Contacts About Us Partners Branding Guideline Sign inSupport 1. Vulners 2. 3. Cve 4. 5. CVE-2024-10924 CVE-2024-10924 đď¸Â 15 Nov 2024 05:03:15Reported by WordfenceType  cveđ web.nvd.nist.govđ 80 Views WordPress Really Simple Security Authentication Bypass CVE-2024-10924 Show more Related Detection Affected Refs ReporterTitlePublishedViews Family All 20 OpenVASWordPress Really Simple Security Pro Plugin 9.0.x < 9.1.2 Authentication Bypass Vulnerability 18 Nov 202401:00 âopenvas OpenVASWordPress Really Simple Security Plugin 9.0.x < 9.1.2 Authentication Bypass Vulnerability 18 Nov 202401:00 âopenvas CvelistCVE-2024-10924 Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass 15 Nov 202404:18 âcvelist PatchstackWordPress Really Simple Security Pro Plugin 9.0.0-9.1.1.1 is vulnerable to Broken Authentication 14 Nov 202401:00 âpatchstack PatchstackWordPress Really Simple SSL Plugin 9.0.0-9.1.1.1 is vulnerable to Broken Authentication 14 Nov 202401:00 âpatchstack PatchstackWordPress Really Simple Security Pro multisite Plugin 9.0.0-9.1.1.1 is vulnerable to Broken Authentication 14 Nov 202401:00 âpatchstack NVDCVE-2024-10924 15 Nov 202405:15 ânvd GithubExploitExploit for Missing Authentication for Critical Function in Really-Simple-Plugins Really Simple Security 3 Dec 202414:12 âgithubexploit GithubExploitExploit for Missing Authentication for Critical Function in Really-Simple-Plugins Really Simple Security 19 Nov 202411:07 âgithubexploit GithubExploitExploit for Missing Authentication for Critical Function in Really-Simple-Plugins Really Simple Security 20 Nov 202414:13 âgithubexploit 10 Rows per page * * 1 * 2 * Nvd Vulners Vulnrichment Node really-simple-pluginsreally_simple_securityRange9.0.0â9.1.2-wordpress OR really-simple-pluginsreally_simple_securityRange9.0.0â9.1.2prowordpress OR really-simple-pluginsreally_simple_securityRange9.0.0â9.1.2pro_multisitewordpress Show more CNA Copy [ { "vendor": "Really Simple Plugins", "product": "Really Simple Security Pro multisite", "versions": [ { "version": "9.0.0", "status": "affected", "lessThanOrEqual": "9.1.1.1", "versionType": "semver" } ], "defaultStatus": "unaffected" }, { "vendor": "rogierlankhorst", "product": "Really Simple Security â Simple and Performant Security (formerly Really Simple SSL)", "versions": [ { "version": "9.0.0", "status": "affected", "lessThanOrEqual": "9.1.1.1", "versionType": "semver" } ], "defaultStatus": "unaffected" }, { "vendor": "Really Simple Plugins", "product": "Really Simple Security Pro", "versions": [ { "version": "9.0.0", "status": "affected", "lessThanOrEqual": "9.1.1.1", "versionType": "semver" } ], "defaultStatus": "unaffected" } ] Show more SourceLinkwordfencewww.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446bepluginswww.plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.phpwordfencewww.wordfence.com/blog/2024/11/really-simple-security-vulnerability/pluginswww.plugins.trac.wordpress.org/changeset/3188431/really-simple-sslpluginswww.plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.phppluginswww.plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php Transform Your Security Services Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy. Book a live demo Solutions * Vulnerabilities intelligence * Perimeter control tool * Linux scanner * Windows scanner * Developers SDK * Security Intelligence feeds Database * Vulnerabilities * Exploits * Security News * BugBounty * Wild Exploited * Top Vulnerabilities * CVE Feed Resources * Statics & Sources * Plugins * API docs * FAQ * Blog * Glossary Company * About * Contacts * Pricing * EULA * Privacy Policy * Submission Policy * OpenSource @2024 Vulners Inc 15 Nov 2024 05:15Current 9.7High risk Vulners AI Score9.7 CVSS39.8 EPSS0.007 CWE-306CWE-288 wordpresssecurityauthenticationbypasscve-2024-10924pluginsvulnerabletwo-factorrest apiadministratorunauthenticatedattackers 80 .json Report New Introduce New bulletin view! Navigate sections with ease â everythingâs right where you need it Amazing!