[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhT7RcqIahSnIHPpbs1HgSBCV_Iw06ZDXUZdmqpk4afo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20,"patch_diff_files":21,"patch_trac_url":22},"CVE-2024-24873","cp-polls-unauthenticated-poll-limit-bypass","CP Polls \u003C= 1.0.71 - Unauthenticated Poll Limit Bypass","The Polls CP plugin for WordPress is vulnerable to Poll Limit Bypass in all versions up to, and including, 1.0.71. This is due to insufficient controls on on the voting system. This makes it possible for unauthenticated attackers to vote multiple times.","cp-polls",null,"\u003C=1.0.71","1.0.72","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2024-02-05 00:00:00","2024-02-08 15:13:50",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2c80de83-3996-4048-8aa3-3611b002fc01?source=api-prod",4,[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fcp-polls%2Ftags%2F1.0.71&new_path=%2Fcp-polls%2Ftags%2F1.0.72"]