Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Oct 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wpplugin:time_clock:*:*:*:*:-:wordpress:*:* cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:* |
Fri, 18 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpplugin
Wpplugin time Clock Wpplugin time Clock Pro |
|
| CPEs | cpe:2.3:a:wpplugin:time_clock:*:*:*:*:*:*:*:* cpe:2.3:a:wpplugin:time_clock_pro:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wpplugin
Wpplugin time Clock Wpplugin time Clock Pro |
|
| Metrics |
ssvc
|
Fri, 18 Oct 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified. | |
| Title | Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-18T18:56:31.697Z
Reserved: 2024-10-07T16:39:29.691Z
Link: CVE-2024-9593
Updated: 2024-10-18T18:56:23.058Z
Status : Analyzed
Published: 2024-10-18T18:15:04.540
Modified: 2024-10-29T13:40:23.983
Link: CVE-2024-9593
No data.
OpenCVE Enrichment
No data.