Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Nickolas Bossinas
  4. WordPress File Upload
  5. 2.0.2

Known Vulnerabilities in WordPress File Upload 2.0.2

Show more ↓
4.24.15
4.24.14
4.24.13
4.24.12
4.24.11
4.24.10
4.24.9
4.24.8
4.24.7
4.24.6
4.24.5
4.24.4
4.24.3
4.24.2
4.24.1
4.24.0
4.23.3
4.23.2
4.23.1
4.23.0
4.22.2
4.22.1
4.22.0
4.21.7
4.21.6
4.21.5
4.20.0
4.19.2
4.19.1
4.19.0
4.18.1
4.18.0
4.17.0
4.16.4
4.16.3
4.16.2
4.16.1
4.16.0
4.15.0
4.14.4
4.14.3
4.14.2
4.14.1
4.14.0
4.13.1
4.13.0
4.12.2
4.12.1
4.12.0
4.11.2
4.11.1
4.11.0
4.10.3
4.10.2
4.10.1
4.10.0
4.9.1
4.9.0
4.8.0
4.7.0
4.6.2
4.6.1
4.6.0
4.5.1
4.5.0
4.4.0
4.3.4
4.3.3
4.3.2
4.3.1
4.3.0
4.2.0
4.1.0
4.0.1
4.0.0
3.11.0
3.10.0
3.9.6
3.9.5
3.9.4
3.9.3
3.9.2
3.9.1
3.9.0
3.8.5
3.8.4
3.8.3
3.8.2
3.8.1
3.8.0
3.7.3
3.7.2
3.7.1
3.7.0
3.6.1
3.6.0
3.5.0
3.4.1
3.4.0
3.3.1
3.3.0
3.2.1
3.2.0
3.1.2
3.1.1
3.1.0
3.0.0
2.7.6
2.7.5
2.7.4
2.7.3
2.7.2
2.7.1
2.7.0
2.6.0
2.5.5
2.5.4
2.5.3
2.5.2
2.5.1
2.5.0
2.4.6
2.4.5
2.4.4
2.4.3
2.4.2
2.4.1
2.3.1
2.2.3
2.2.2
2.2.1
2.1.3
2.1.2
2.0.2
2.0.1



Cross-site scripting in WordPress File Upload06 Apr, 2018
Low Patched Public exploit


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Leak Zone underground forum exposed users’ IPs in massive data leak
  • Threat actors breach Toptal GitHub account in supply chain attack
  • Endgame Gear warns of malware in its mouse configuration tool
  • Lionishackers cybercriminal group linked to underground data trade and hacktivism
  • Hacker plants data-wiping code in Amazon’s AI coding extension
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.