This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The HUSKY plugin used in WordPress has a security vulnerability that affects versions 1.3.7 and below. This means that attackers who have contributor-level access or higher can access and run any fil...
Read MoreA plugin called HUSKY - Products Filter Professional for WooCommerce on WordPress has a security issue that affects all versions up to 1.3.6.4. This means that attackers with at least Subscriber-leve...
Read MoreA plugin called HUSKY - Products Filter Professional for WooCommerce on WordPress has a security issue in all versions up to 1.3.6.5. This allows anyone to access and run any files on the server with...
Read MoreThe HUSKY – Products Filter Professional for WooCommerce plugin for WordPress has a security issue that could allow hackers to inject harmful web scripts into pages. This can happen if a user is tr...
Read MoreA plugin called "HUSKY – Products Filter Professional for WooCommerce" on WordPress has a security issue in all versions up to 1.3.6.1. This is because it does not properly check for a user's permi...
Read MoreA plugin called "HUSKY – Products Filter Professional for WooCommerce" on the WordPress website has a security vulnerability. This means that someone who is not authorized can change important info...
Read MoreThe HUSKY – Products Filter Professional for WooCommerce plugin for WordPress has a security vulnerability that can be exploited through the 'woof_author' parameter. This can allow unauthorized ind...
Read MoreThe HUSKY - Products Filter Professional for WooCommerce plugin on WordPress is not secure and can be easily attacked by malicious users. This is due to a lack of protection against harmful code bein...
Read MoreA plugin called "HUSKY – Products Filter Professional for WooCommerce" on WordPress has a security issue. It can be exploited by hackers with subscriber-level access or higher to run code on the se...
Read MoreThe HUSKY - Products Filter plugin, also known as WOOF, used with WordPress, has a security issue. Versions 1.3.5.1 and earlier are at risk of Cross-Site Request Forgery. This means that attackers wh...
Read MoreA popular WordPress plugin called "HUSKY – Products Filter Professional for WooCommerce" has a security flaw that could allow hackers to access and run any files on the server. This can happen if t...
Read MoreA popular plugin called HUSKY - Products Filter for WooCommerce Professional on WordPress has a security issue. This is because the plugin does not properly protect against a type of attack called SQ...
Read MoreThe HUSKY - Products Filter for WooCommerce Professional plugin for WordPress has a security issue where hackers can insert harmful code into the plugin's 'woof' shortcode. This can happen in version...
Read MoreThe HUSKY – Products Filter for WooCommerce (formerly WOOF) plugin for WordPress has a security vulnerability in versions up to, and including, 1.3.4.3. Attackers can exploit this vulnerability by ...
Read MoreThe HUSKY – Products Filter for WooCommerce plugin (formerly WOOF) for WordPress is vulnerable to a type of attack called "generic SQL injection" in versions up to 1.3.4.2. This type of attack occu...
Read MoreThe HUSKY – Products Filter for WooCommerce plugin for WordPress, which was previously called WOOF, is vulnerable to unauthorized access of data in versions up to 1.3.4.2. This means that users wit...
Read More(XSS) vulnerability.
Read MoreA security problem was found in a WordPress plugin called WooCommerce Products Filter (also known as WOOF). This problem allowed people to access a page redraw AJAX function without having to log in. ...
Read MoreA vulnerability was discovered in the WooCommerce Products Filter (also known as WOOF) plugin for WordPress. This vulnerability existed before version 1.2.0 and allowed an attacker to inject malicious...
Read MoreThe HUSKY plugin for WordPress has a security flaw that could let an attacker with administrator-level access inject a malicious code into the system. The flaw is present in versions up to and includi...
Read More