RSFirewall attempts to identify original IP via HTTP headers, leading to bypass
Reporter | Title | Published | Views | Family All 4 |
---|---|---|---|---|
![]() | CVE-2021-4226 | 15 Dec 202219:15 | – | nvd |
![]() | WordPress RSFirewall! plugin <= 1.1.24 - IP Block Bypass vulnerability | 13 Apr 202200:00 | – | patchstack |
![]() | Design/Logic Flaw | 15 Dec 202219:15 | – | prion |
![]() | CVE-2021-4226 RSFirewall < 1.1.25 - IP Block Bypass | 15 Dec 202217:14 | – | cvelist |
[
{
"vendor": "Unknown",
"product": "RSFirewall!",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThan": "1.1.25"
}
],
"defaultStatus": "unaffected",
"collectionURL": "https://wordpress.org/plugins"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo