PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
Every day our team monitors threats that put your website at risk. We proactively patch vulnerabilities to protect your users, data, and your reputation.
19 vulnerabilities patched in the last 30 days
Page last updated:
Type
Affected Software
Latest Version
Description
Severity
Date
Plugin
<=
0.8.3
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
311 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
0.8.3
Description
pulse_description
311 days ago
Plugin
<=
3.0.4
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
311 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.4
Description
pulse_description
311 days ago
Plugin
<=
1.5.1
Server Side Request Forgery (SSRF) – This could allow a malicious actor to cause a website to execute website requests to an arbitrary domain of the attacker. This could allow a malicious actor to find sensitive information of other services running on the system.
4.9
311 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
1.5.1
Description
pulse_description
311 days ago
Plugin
<=
3.0.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
311 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
3.0.2
Description
pulse_description
311 days ago
Plugin
<=
2.9.6
PHP Object Injection – This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
7.2
311 days ago
Type
Plugin
7.2
Affected Software
Latest Version
<=
2.9.6
Description
pulse_description
311 days ago
Plugin
<=
4.1.1
Privilege Escalation – This could allow a malicious actor to escalate their low privileged account to something with higher privileges. After this they could take full control of the website if high privileges are gained.
9.8
313 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
4.1.1
Description
pulse_description
313 days ago
Plugin
<=
2.6.2
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
2.7
314 days ago
Type
Plugin
2.7
Affected Software
Latest Version
<=
2.6.2
Description
pulse_description
314 days ago
Plugin
<=
3.22.1
Broken Access Control – A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action.
4.3
314 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
3.22.1
Description
pulse_description
314 days ago
Plugin
<=
3.5.3
Local File Inclusion – This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.
9.8
318 days ago
Type
Plugin
9.8
Affected Software
Latest Version
<=
3.5.3
Description
pulse_description
318 days ago
Plugin
<=
2.2.5
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
318 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.2.5
Description
pulse_description
318 days ago
Plugin
<=
2.6.0
Arbitrary File Download – This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
4.9
318 days ago
Type
Plugin
4.9
Affected Software
Latest Version
<=
2.6.0
Description
pulse_description
318 days ago
Plugin
<=
3.7.3
Content Injection – This could allow a malicious actor to inject their own content into pages and posts of your website. This could also be abused to inject phishing pages into your website.
7.3
320 days ago
Type
Plugin
7.3
Affected Software
Latest Version
<=
3.7.3
Description
pulse_description
320 days ago
Plugin
<=
2.4.13
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
4.3
321 days ago
Type
Plugin
4.3
Affected Software
Latest Version
<=
2.4.13
Description
pulse_description
321 days ago
Plugin
<=
3.2.1
Broken Access Control – A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action.
5.4
324 days ago
Type
Plugin
5.4
Affected Software
Latest Version
<=
3.2.1
Description
pulse_description
324 days ago
Plugin
<=
2.1.9
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
324 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
2.1.9
Description
pulse_description
324 days ago
Plugin
<=
3.3.1
Cross Site Request Forgery (CSRF) – This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
5.4
325 days ago
Type
Plugin
5.4
Affected Software
Latest Version
<=
3.3.1
Description
pulse_description
325 days ago
Plugin
<=
9.8.0
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
325 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
9.8.0
Description
pulse_description
325 days ago
Plugin
<=
3.1.2
SQL Injection – This could allow a malicious actor to directly interact with your database, including but not limited to stealing information.
7.6
328 days ago
Type
Plugin
7.6
Affected Software
Latest Version
<=
3.1.2
Description
pulse_description
328 days ago
Plugin
<=
5.3.1
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
328 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
5.3.1
Description
pulse_description
328 days ago
Plugin
<=
6.2.2
Cross Site Scripting (XSS) – This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
6.5
328 days ago
Type
Plugin
6.5
Affected Software
Latest Version
<=
6.2.2
Description
pulse_description
328 days ago
Explore our comprehensive WordPress support plans designed to proactively patch vulnerabilities and safeguard your online presence.