Documentation: Home / Stop User Enumeration
This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The Freemius SDK for WordPress is vulnerable to an attack known as Reflected Cross-Site Scripting. This attack is possible because of insufficient security measures in versions of the Freemius SDK up ...
Read MoreThe WordPress Stop User Enumeration Plugin for WordPress is vulnerable to a security bypass in versions up to 1.2.4. This means that unauthenticated attackers can perform actions that should be secur...
Read MoreThe Stop User Enumeration plugin for WordPress is not secure in versions up to and including 1.3.4. This means that unauthenticated attackers can figure out the list of valid users, which can then be...
Read MoreThe Stop User Enumeration plugin for WordPress is not secure in versions up to 1.3.7. This means that it is possible for someone to trick the plugin into letting them add malicious code to a website. ...
Read MoreThe Stop User Enumeration plugin for WordPress is not secure in versions up to 1.3.8. This means that anyone who is not logged in can make a list of usernames by exploiting the vulnerability in the R...
Read MoreThe Stop User Enumeration plugin for WordPress has a security flaw that affects versions up to and including 1.3.8. This means that an unauthenticated attacker can use a POST request to the REST API t...
Read MoreThe Freemius SDK is a plugin used in WordPress websites. A security vulnerability was discovered in versions up to 2.2.3 which could allow users with subscriber-level permissions to change settings an...
Read More© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)