CROWD-SOURCED
VULNERABILITIES DATABASE

Vulnerabilities Crowdsourced from WordPress security researchers and the amazing public databases of –

UserFeedback Lite - Cross site scripting < 1.0.16
PROTECTED
WordPress Team Manager - Authenticated Local File Inclusion < 2.1.13
PROTECTED
Barcode Scanner with Inventory & Order Manager - SQL injection < 1.6.2
PROTECTED
SEO Plugin by Squirrly SEO - SQL Injection < 12.3.20
PROTECTED
Getwid - Gutenberg Blocks < 2.0.11
PROTECTED
JS Help Desk - The Ultimate Help Desk & Support Plugin - Unauthenticated < 2.8.7
PROTECTED
Media Library Assistant - Arbritrary file upload < 3.19
PROTECTED
InPost PL - Unauthenticated Arbitrary File Read and Delete < 1.4.5
PROTECTED
Zephyr Project Manager - Privilege Escalation < 3.3.102
PROTECTED
Zephyr Project Manager - Privilege Escalation < 3.3.102
PROTECTED
Slider & Popup Builder by Depicter - Arbitrary File Upload < 3.1.2
PROTECTED
Contact Form by Bit Form (SQL injection) < 2.13.10
PROTECTED
Contact Form by Bit Form (Arbritary File Access) < 2.13.5
PROTECTED
GiveWP - Donation Plugin and Fundraising Platform (PHP Object Injection) < 3.14.2
PROTECTED
Shopping Cart & eCommerce Store (SQL injection) < 5.7.3
PROTECTED
AdRotate - Ad manager & AdSense Ads (Double extension attack)
PROTECTED
Image Optimizer, Resizer and CDN - Sirv (Arbitrary File Upload) < 7.2.8
PROTECTED
LiteSpeed Cache (Unauthenticated Privilege Escalation) < 6.4
PROTECTED
Image Optimizer, Resizer and CDN - Sirv (Arbitrary File Upload) < 7.2.8
PROTECTED
WooCommerce Google Feed Manager (Arbitrary File Deletion) < 2.9.0
PROTECTED