Known Vulnerabilities for products from WpWave

Listed below are 2 of the newest known vulnerabilities associated with the vendor "WpWave".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-36917 WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a ... 7.5 - HIGH 2021-11-24 2021-11-27
CVE-2021-36916 The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP addr... 9.8 - CRITICAL 2021-11-24 2021-11-26

Popular searches for "WpWave"

wpWave | Amazing WordPress Security Plugin | Hide My WP

wpwave.com

Wave | Amazing WordPress Security Plugin | Hide My WP Official website of Hide My WP. We are offering the world's top security plugin for WordPress. It hides your WP from attackers, spammers & theme detectors.

Windows Phone WordPress Plug-in (computing) Website Computer security Image scanner Security hacker Spamming Security Blog Theme (computing) Free software Email spam Copyright Sensor Technical standard Cyberwarfare Information security Windows Fax and Scan Hacker culture

Blog | wpWave

wpwave.com/blog

Blog | wpWave November 7, 2021 Nishitha 0 Does your website use contact forms to collect user information? November 6, 2021 Nishitha 0 Have you always wondered about how to keep track of things happening on your website? November 2, 2021 Nishitha 0 Do you suspect that your website might have a file upload vulnerability? November 1, 2021 Nishitha 0 Have you ever looked up your website on Google only to find a pharma ad? Learn about the pharma hack and ways to fix it in a few simple steps.

Website WordPress Upload Blog Vulnerability (computing) Google User information Plug-in (computing) Security hacker User (computing) Windows Phone Pharmaceutical industry How-to Spamming Advertising Computer monitor Computer security Electrical contacts Information security audit Form (HTML)