Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Michael Nelson
  4. Print My Blog

Known Vulnerabilities in Print My Blog

Show more ↓
3.27.5
3.27.4
3.27.3
3.27.2
3.27.1
3.27.0
3.26.3
3.26.2
3.26.0
3.25.5
3.25.4
3.25.3
3.25.2
3.25.1
3.24.4
3.24.3
3.24.2
3.23.5
3.23.3
3.22.0
3.21.5
3.21.2
3.20.6
3.19.1
3.18.11
3.18.9
3.18.8
3.18.7
3.18.6
3.18.3
3.18.2
3.17.2
3.17.1
3.17.0
3.16.5
3.16.4
3.16.3
3.16.2
3.16.1
3.16.0
3.15.9
3.15.8
3.15.7
3.15.6
3.15.5
3.15.4
3.13.2
3.13.1
3.12.11
3.12.10
3.12.9
3.12.8
3.12.7
3.12.2
3.11.4
3.11.1
3.10.1
3.8.2
3.8.1
3.7.3
3.7.1
3.7.0
3.6.2
3.6.1
3.6.0
3.5.0
3.4.7
3.4.6
3.4.5
3.4.4
3.4.3
3.4.2
3.4.1
3.4.0
3.3.9
3.3.8
3.3.6
3.3.4
3.3.3
3.3.2
3.3.1
3.3.0
2.9.8
2.9.7
2.9.6
2.9.5
2.9.4
2.9.3
2.9.2
2.9.1
2.9.0
2.8.0
2.7.2
2.6.2
2.6.1
2.6.0
2.3.6
2.3.5
2.3.4
2.3.2
2.3.1
2.3.0
2.2.2
2.2.1
2.2.0
2.1.5
2.1.4
2.1.3
2.1.2
2.1.1
2.1.0
2.0.0
1.14.0
1.13.2
1.13.1
1.13.0
1.12.2
1.12.1
1.12.0
1.11.2
1.11.1
1.10.0
1.9.6
1.9.4
1.9.3
1.9.2
1.8.0
1.7.1
1.7.0
1.6.8
1.6.7
1.6.6
1.6.5
1.6.4
1.6.2
1.5.0



SSRF in Print My Blog plugin for WordPress27 Apr, 2019
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Critical vBulletin vulnerability exploited in the wild
  • BitMEX crypto exchange targeted in Lazarus phishing attack
  • Hackers target Korean internet cafés with CoinMiner attacks using Gh0st RAT
  • International law enforcement op shuts down major cybercrime tool AVCheck
  • Cyber Security Week in Review: May 30, 2025
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.