Every day our team monitors threats that put your website at risk. We proactively patch vulnerabilities to protect your users, data, and your reputation.
29 vulnerabilities patched in the last 30 days
Page last updated:
Type
Affected Software
Latest Version
Description
Severity
Date
Plugin
<=
4.1.5
7.1
393 days ago
Type
Plugin
7.1
Affected Software
Latest Version
<=
4.1.5
Description
pulse_description
393 days ago
Plugin
<=
2.9.0
6.5
393 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
2.9.0
Description
pulse_description
393 days ago
Plugin
<=
3.6.3
6.5
393 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.6.3
Description
pulse_description
393 days ago
Plugin
<=
3.5.7
6.5
395 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.5.7
Description
pulse_description
395 days ago
Plugin
<=
3.17.0
Directory Traversal – This could allow a malicious actor to see all files in a given directory or determine if certain files/directories exist in given folder. This can be used to exploit other weaknesses in the system
4.1
395 days ago
Type
Plugin
4.1
Affected Software
Latest Version
<=
3.17.0
Description
pulse_description
395 days ago
Plugin
<=
3.4.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
395 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.4.7
Description
pulse_description
395 days ago
Plugin
<=
4.21.7
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
398 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
4.21.7
Description
pulse_description
398 days ago
Plugin
<=
0.8.3
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
399 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
0.8.3
Description
pulse_description
399 days ago
Plugin
<=
3.0.4
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
399 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
399 days ago
Plugin
<=
1.5.1
Server Side Request Forgery (SSRF) – This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.
4.9
399 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
1.5.1
Description
pulse_description
399 days ago
Plugin
<=
3.0.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
399 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.2
Description
pulse_description
399 days ago
Plugin
<=
2.9.6
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
399 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
2.9.6
Description
pulse_description
399 days ago
Plugin
<=
4.1.1
Privilege Escalation – This could allow a malicious actor to escalate their low privileged account to something with higher privileges. After this they could take full control of the website if high privileges are gained.
9.8
400 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
4.1.1
Description
pulse_description
400 days ago
Plugin
<=
2.6.2
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
2.7
402 days ago
Type
Plugin
2.7
Affected Software
Latest Version
<=
2.6.2
Description
pulse_description
402 days ago
Plugin
<=
3.22.1
Broken Access Control – A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action.
4.3
402 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
3.22.1
Description
pulse_description
402 days ago
Plugin
<=
3.5.3
Local File Inclusion – This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.
9.8
406 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
3.5.3
Description
pulse_description
406 days ago
Plugin
<=
2.2.5
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
406 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.2.5
Description
pulse_description
406 days ago
Plugin
<=
2.6.0
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
4.9
406 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
2.6.0
Description
pulse_description
406 days ago
Plugin
<=
3.7.3
Content Injection – This could allow a malicious actor to inject their own content into pages and posts of your website. This could also be abused to inject phishing pages into your website.
7.3
408 days ago
Type
Plugin
7.3
Affected Software
Latest Version
<=
3.7.3
Description
pulse_description
408 days ago
Plugin
<=
2.4.13
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
409 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.4.13
Description
pulse_description
409 days ago
Explore our comprehensive WordPress support plans designed to proactively patch vulnerabilities and safeguard your online presence.