Every day our team monitors threats that put your website at risk. We proactively patch vulnerabilities to protect your users, data, and your reputation.
28 vulnerabilities patched in the last 30 days
Page last updated:
Type
Affected Software
Latest Version
Description
Severity
Date
Plugin
<=
4.1.5
7.1
286 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
4.1.5
Description
pulse_description
286 days ago
Plugin
<=
2.9.0
6.5
286 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
2.9.0
Description
pulse_description
286 days ago
Plugin
<=
3.6.3
6.5
286 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.6.3
Description
pulse_description
286 days ago
Plugin
<=
3.5.7
6.5
287 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.5.7
Description
pulse_description
287 days ago
Plugin
<=
3.17.0
Directory Traversal – This could allow a malicious actor to see all files in a given directory or determine if certain files/directories exist in given folder. This can be used to exploit other weaknesses in the system
4.1
287 days ago
Type
Plugin
4.1
Affected Software
Latest Version
<=
3.17.0
Description
pulse_description
287 days ago
Plugin
<=
3.4.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
287 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.4.7
Description
pulse_description
287 days ago
Plugin
<=
4.21.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
290 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
4.21.7
Description
pulse_description
290 days ago
Plugin
<=
0.8.3
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
291 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
0.8.3
Description
pulse_description
291 days ago
Plugin
<=
3.0.4
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
291 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
291 days ago
Plugin
<=
1.5.1
Server Side Request Forgery (SSRF) – This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.
4.9
291 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
1.5.1
Description
pulse_description
291 days ago
Plugin
<=
3.0.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
291 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.2
Description
pulse_description
291 days ago
Plugin
<=
2.9.6
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
291 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
2.9.6
Description
pulse_description
291 days ago
Plugin
<=
4.1.1
Privilege Escalation – This could allow a malicious actor to escalate their low privileged account to something with higher privileges. After this they could take full control of the website if high privileges are gained.
9.8
293 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
4.1.1
Description
pulse_description
293 days ago
Plugin
<=
2.6.2
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
2.7
294 days ago
Type
Plugin
2.7
Affected Software
Latest Version
<=
2.6.2
Description
pulse_description
294 days ago
Plugin
<=
3.22.1
Broken Access Control – A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action.
4.3
294 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
3.22.1
Description
pulse_description
294 days ago
Plugin
<=
3.5.3
Local File Inclusion – This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.
9.8
298 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
3.5.3
Description
pulse_description
298 days ago
Plugin
<=
2.2.5
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
298 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.2.5
Description
pulse_description
298 days ago
Plugin
<=
2.6.0
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
4.9
298 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
2.6.0
Description
pulse_description
298 days ago
Plugin
<=
3.7.3
Content Injection – This could allow a malicious actor to inject their own content into pages and posts of your website. This could also be abused to inject phishing pages into your website.
7.3
300 days ago
Type
Plugin
7.3
Affected Software
Latest Version
<=
3.7.3
Description
pulse_description
300 days ago
Plugin
<=
2.4.13
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
301 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.4.13
Description
pulse_description
301 days ago
Explore our comprehensive WordPress support plans designed to proactively patch vulnerabilities and safeguard your online presence.