The NPS computy WordPress plugin through 2.7.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ | Exploit Third Party Advisory |
Configurations
History
08 May 2025, 19:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:computy:nps_computy:*:*:*:*:*:wordpress:*:* | |
First Time |
Computy nps Computy
Computy |
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ - |
08 Jul 2024, 14:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
15 Apr 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-15 05:15
Updated : 2025-05-08 19:50
NVD link : CVE-2024-1755
Mitre link : CVE-2024-1755
CVE.ORG link : CVE-2024-1755
JSON object : View
Products Affected
computy
- nps_computy
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')