Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Snap Creek
  4. Duplicator - WordPress Migration Plugin
  5. 0.5.30

Known Vulnerabilities in Duplicator - WordPress Migration Plugin 0.5.30

Show more ↓
1.5.11.2
1.5.11.1
1.5.11
1.5.10.2
1.5.10.1
1.5.10
1.5.9
1.5.8.1
1.5.8
1.5.7.1
1.5.7
1.5.6.1
1.5.6
1.5.5.1
1.5.5
1.5.4
1.5.3.1
1.5.3
1.5.2.1
1.5.2
1.5.1
1.5.0
1.4.7.2
1.4.7.1
1.4.7
1.4.6
1.4.5
1.4.4
1.4.3
1.4.2
1.4.1
1.4.0
1.3.40.1
1.3.40
1.3.38
1.3.36
1.3.34
1.3.32
1.3.30
1.3.28
1.3.26
1.3.24
1.3.22
1.3.20
1.3.18
1.3.16
1.3.14
1.3.12
1.3.10
1.3.8
1.3.6
1.3.4
1.3.2
1.3.0
1.2.52
1.2.50
1.2.48
1.2.46
1.2.44
1.2.42
1.2.40
1.2.38
1.2.36
1.2.34
1.2.32
1.2.30
1.2.28
1.2.26
1.2.24
1.2.22
1.2.20
1.2.18
1.2.16
1.2.14
1.2.12
1.2.10
1.2.8
1.2.6
1.2.4
1.2.2
1.2.0
1.1.34
1.1.32
1.1.30
1.1.28
1.1.26
1.1.24
1.1.22
1.1.20
1.1.18
1.1.16
1.1.14
1.1.12
1.1.10
1.1.8
1.1.6
1.1.4
1.1.2
1.1.0
0.5.34
0.5.32
0.5.30
0.5.28
0.5.26
0.5.24
0.5.22
0.5.20
0.5.18
0.5.16
0.5.14
0.5.12
0.5.10
0.5.8
0.5.6
0.5.4
0.5.2
0.5.1
0.5.0
0.4.6



Cross-site request forgery in Duplicator – WordPress Migration Plugin10 Feb, 2016
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: June 6, 2025
  • New PathWiper malware targets critical infrastructure in Ukraine
  • US seizes 145 domains linked to BidenCash carding forum
  • Hackers target multinational firms in Salesforce data breach scheme
  • Hacker targets GitHub users with trojanized code laced with backdoors
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.