Every day our team monitors threats that put your website at risk. We proactively patch vulnerabilities to protect your users, data, and your reputation.
22 vulnerabilities patched in the last 30 days
Page last updated:
Type
Affected Software
Latest Version
Description
Severity
Date
Theme
<=
28.0.3
6.5
0 days ago
Type
Theme
6.5
Affected Software
Latest Version
<=
28.0.3
Description
pulse_description
0 days ago
Plugin
<=
3.1.1
7.5
0 days ago
Type
Plugin
7.5
Affected Software
Latest Version
<=
3.1.1
Description
pulse_description
0 days ago
Plugin
<=
4.2.1
8.8
13 days ago
Type
Plugin
8.8
Affected Software
Latest Version
<=
4.2.1
Description
pulse_description
13 days ago
Plugin
<=
3.0.4
5.9
17 days ago
Type
Plugin
5.9
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
17 days ago
Plugin
<=
2.1.10
7.1
18 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
2.1.10
Description
pulse_description
18 days ago
Plugin
<=
1.5.142
6.5
18 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
1.5.142
Description
pulse_description
18 days ago
Theme
<=
3.5.4
8.8
20 days ago
Type
Theme
8.8
Affected Software
Latest Version
<=
3.5.4
Description
pulse_description
20 days ago
Plugin
<=
4.1.5
7.1
20 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
4.1.5
Description
pulse_description
20 days ago
Plugin
<=
2.9.0
6.5
20 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
2.9.0
Description
pulse_description
20 days ago
Plugin
<=
3.6.3
6.5
20 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.6.3
Description
pulse_description
20 days ago
Plugin
<=
3.5.7
6.5
21 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.5.7
Description
pulse_description
21 days ago
Plugin
<=
3.17.0
Directory Traversal – This could allow a malicious actor to see all files in a given directory or determine if certain files/directories exist in given folder. This can be used to exploit other weaknesses in the system
4.1
21 days ago
Type
Plugin
4.1
Affected Software
Latest Version
<=
3.17.0
Description
pulse_description
21 days ago
Plugin
<=
3.4.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
21 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.4.7
Description
pulse_description
21 days ago
Plugin
<=
4.21.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
24 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
4.21.7
Description
pulse_description
24 days ago
Plugin
<=
0.8.3
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
25 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
0.8.3
Description
pulse_description
25 days ago
Plugin
<=
3.0.4
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
25 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
25 days ago
Plugin
<=
1.5.1
Server Side Request Forgery (SSRF) – This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.
4.9
25 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
1.5.1
Description
pulse_description
25 days ago
Plugin
<=
3.0.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
25 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.2
Description
pulse_description
25 days ago
Plugin
<=
2.9.6
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
25 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
2.9.6
Description
pulse_description
25 days ago
Plugin
<=
4.1.1
Privilege Escalation – This could allow a malicious actor to escalate their low privileged account to something with higher privileges. After this they could take full control of the website if high privileges are gained.
9.8
27 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
4.1.1
Description
pulse_description
27 days ago
Explore our comprehensive WordPress support plans designed to proactively patch vulnerabilities and safeguard your online presence.