Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Darren Cooney
  4. WordPress Infinite Scroll - Ajax Load More
  5. 5.4.5

Known Vulnerabilities in WordPress Infinite Scroll - Ajax Load More 5.4.5

Show more ↓
7.1.4
7.1.3
7.1.2
7.1.1
7.1.0.1
7.1.0
7.0.3
7.0.2
7.0.1
7.0.0
6.2.0.3
6.2.0.2
6.2.0.1
6.2.0
6.1.0.1
6.1.0
6.0.2
6.0.1
6.0.0
5.6.0.5
5.6.0.4
5.6.0.3
5.6.0.2
5.6.0.1
5.6.0
5.5.5
5.5.4.1
5.5.4
5.5.3
5.5.2
5.5.1
5.5.0.1
5.5.0
5.4.5
5.4.4
5.4.3
5.4.2.1
5.4.2
5.4.1
5.4.0
5.3.8
5.3.7
5.3.6
5.3.5
5.3.4
5.3.3
5.3.1
5.3.0
5.2.0
5.1.8
5.1.7.2
5.1.7.1
5.1.7
5.1.6.1
5.1.6
5.1.5
5.1.4
5.1.3
5.1.2
5.1.1
5.1.0.1
5.1.0
5.0.2
5.0.1
4.2.0.1
4.1.0
4.0
3.7.1
3.6.1
3.6
3.5.1
3.5
3.4.1
3.4.0
3.3.1
3.3.0.1
3.3.0
3.2.1
3.2
3.1.2
3.1.1
3.1.0
3.0.1
3.0
2.14.1
2.14.0
2.13.1
2.13.0.1
2.13.0
2.12.0
2.11.2
2.11.1
2.11.0
2.10.1
2.10.0.1
2.9.0
2.8.6
2.8.5
2.8.4
2.8.3
2.8.2
2.8.1.2
2.8.0
2.7.3
2.7.2
2.7.1
2.7.0
2.6.3.2
2.6.3.1
2.6.3
2.6.2
2.6.1
2.6.0
2.5.1
2.4.1
2.4.0
2.3.1
2.2.8
2.2.7
2.2.6
2.2.3
2.2.2
2.2.1
2.1.3
2.1.1
2.0.5
2.0.3



Multiple vulnerabilities in WordPress Infinite Scroll – Ajax Load More plugin06 Sep, 2022
Low Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: May 23, 2025
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.