[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$faAphdv0Hl-7tt__XbYW6OrfAj8J2rQqZA6_v_Bb2_0c":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-1581","wp-polls-ip-validation-bypass","WP-Polls \u003C= 2.75.6 - IP Validation Bypass","The WP-Polls plugin for WordPress is vulnerable to IP Validation Bypass in versions up to, and including, 2.75.6. This is due to the plugin prioritizing easier to spoof IP detection mechanisms. This makes it possible for unauthenticated attackers to bypass IP-based limitations to polling.","wp-polls",null,"\u003C=2.75.6","2.76.0","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2022-10-31 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fbc53ad70-d630-4d4a-bcca-79732134e6a6?source=api-prod",449]