Show filters
31 Total Results
Displaying 1-10 of 31
Sort by:
Attacker Value
Unknown
CVE-2022-4100
Disclosure Date: August 31, 2024 (last updated September 20, 2024)
The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been blocked to bypass this control by setting the X-Forwarded-For: HTTP header to an IP Address that hasn't been blocked.
0
Attacker Value
Unknown
CVE-2024-5052
Disclosure Date: May 17, 2024 (last updated May 17, 2024)
Denial of Service (DoS) vulnerability for Cerberus Enterprise 8.0.10.3 web administration. The vulnerability exists when the web server, default port 10001, attempts to process a large number of incomplete HTTP requests.
0
Attacker Value
Unknown
CVE-2022-4712
Disclosure Date: October 20, 2023 (last updated October 27, 2023)
The WP Cerber Security plugin for WordPress is vulnerable to stored cross-site scripting via the log parameter when logging in to the site in versions up to, and including, 9.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2022-4417
Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users
0
Attacker Value
Unknown
CVE-2022-2939
Disclosure Date: September 06, 2022 (last updated October 08, 2023)
The WP Cerber Security plugin for WordPress is vulnerable to security protection bypass in versions up to, and including 9.0, that makes user enumeration possible. This is due to improper validation on the value supplied through the 'author' parameter found in the ~/cerber-load.php file. In vulnerable versions, the plugin only blocks requests if the value supplied is numeric, making it possible for attackers to supply additional non-numeric characters to bypass the protection. The non-numeric characters are stripped and the user requested is displayed. This can be used by unauthenticated attackers to gather information about users that can targeted in further attacks.
0
Attacker Value
Unknown
CVE-2022-0429
Disclosure Date: March 07, 2022 (last updated October 07, 2023)
The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 8.9.6 does not sanitise the $url variable before using it in an attribute in the Activity tab in the plugins dashboard, leading to an unauthenticated stored Cross-Site Scripting vulnerability.
0
Attacker Value
Unknown
CVE-2021-37597
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
WP Cerber before 8.9.3 allows MFA bypass via wordpress_logged_in_[hash] manipulation.
0
Attacker Value
Unknown
CVE-2021-37598
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
WP Cerber before 8.9.3 allows bypass of /wp-json access control via a trailing ? character.
0
Attacker Value
Unknown
CVE-2019-25046
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
The Web Client in Cerberus FTP Server Enterprise before 10.0.19 and 11.x before 11.0.4 allows XSS via an SVG document.
0
Attacker Value
Unknown
CVE-2020-5196
Disclosure Date: January 14, 2020 (last updated February 21, 2025)
Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission.
0