Ip blacklist cloud Vulnerabilities
Security vulnerability tracking for Ad33lx Ip blacklist cloud
3
1
2
0
Vulnerability Timeline
3 vulnerabilities discovered over time for Ip blacklist cloud
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2015-10105 | 9.8 | This vulnerability allows an attacker to remotely access sensitive files on a server by manipulating a specific filename in the IP Blacklist Cloud Plugin for WordPress. To exploit this, the attacker needs to send a specially crafted request to the affected plugin, which could lead to unauthorized access to the server's file system. | ad33lxip blacklist cloud | Exploit Available | almost 3 years agoMay 1, 2023 |
| CVE-2022-43462 | 7.2 | This vulnerability allows an attacker to manipulate the database of the IP Blacklist Cloud plugin, potentially gaining access to sensitive information or altering data. It affects versions up to 5.00 and requires the attacker to be authenticated, meaning they need to log in to exploit it. | ad33lxip blacklist cloud | Exploit Available | about 3 years agoJan 17, 2023 |
| CVE-2022-42462 | 4.8 | This vulnerability allows an attacker to inject malicious scripts into the IP Blacklist Cloud plugin, which can then be executed in the browsers of users who have access to the plugin. To exploit this, the attacker must have authenticated access to the plugin, meaning they need to log in as a legitimate user. | ad33lxip blacklist cloud | Theoretical | about 3 years agoJan 17, 2023 |
About Ad33lx Ip blacklist cloud Security
This page provides comprehensive security vulnerability tracking for Ad33lx Ip blacklist cloud. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Ip blacklist cloud updated to the latest version
- • Subscribe to security advisories from Ad33lx
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately