Every day our team monitors threats that put your website at risk. We proactively patch vulnerabilities to protect your users, data, and your reputation.
24 vulnerabilities patched in the last 30 days
Page last updated:
Type
Affected Software
Latest Version
Description
Severity
Date
Plugin
<=
4.2.0
7.1
363 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
4.2.0
Description
pulse_description
363 days ago
Theme
<=
28.0.3
6.5
364 days ago
Type
Theme
6.5
Affected Software
Latest Version
<=
28.0.3
Description
pulse_description
364 days ago
Plugin
<=
3.1.1
7.5
364 days ago
Type
Plugin
7.5
Affected Software
Latest Version
<=
3.1.1
Description
pulse_description
364 days ago
Plugin
<=
4.2.1
8.8
377 days ago
Type
Plugin
8.8
Affected Software
Latest Version
<=
4.2.1
Description
pulse_description
377 days ago
Plugin
<=
3.0.4
5.9
381 days ago
Type
Plugin
5.9
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
381 days ago
Plugin
<=
2.1.10
7.1
382 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
2.1.10
Description
pulse_description
382 days ago
Plugin
<=
1.5.142
6.5
382 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
1.5.142
Description
pulse_description
382 days ago
Theme
<=
3.5.4
8.8
384 days ago
Type
Theme
8.8
Affected Software
Latest Version
<=
3.5.4
Description
pulse_description
384 days ago
Plugin
<=
4.1.5
7.1
384 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
4.1.5
Description
pulse_description
384 days ago
Plugin
<=
2.9.0
6.5
384 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
2.9.0
Description
pulse_description
384 days ago
Plugin
<=
3.6.3
6.5
384 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.6.3
Description
pulse_description
384 days ago
Plugin
<=
3.5.7
6.5
385 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.5.7
Description
pulse_description
385 days ago
Plugin
<=
3.17.0
Directory Traversal – This could allow a malicious actor to see all files in a given directory or determine if certain files/directories exist in given folder. This can be used to exploit other weaknesses in the system
4.1
385 days ago
Type
Plugin
4.1
Affected Software
Latest Version
<=
3.17.0
Description
pulse_description
385 days ago
Plugin
<=
3.4.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
385 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.4.7
Description
pulse_description
385 days ago
Plugin
<=
4.21.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
388 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
4.21.7
Description
pulse_description
388 days ago
Plugin
<=
0.8.3
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
389 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
0.8.3
Description
pulse_description
389 days ago
Plugin
<=
3.0.4
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
389 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
389 days ago
Plugin
<=
1.5.1
Server Side Request Forgery (SSRF) – This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.
4.9
389 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
1.5.1
Description
pulse_description
389 days ago
Plugin
<=
3.0.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
389 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.2
Description
pulse_description
389 days ago
Plugin
<=
2.9.6
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
389 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
2.9.6
Description
pulse_description
389 days ago
Explore our comprehensive WordPress support plans designed to proactively patch vulnerabilities and safeguard your online presence.