Vulnerabilities protected by our XSS: Cross Site Scripting firewall rule

15,585,220
Attacks Blocked in Past 24 Hours

Showing 121-140 of 7,093 Vulnerabilities

Title CVE ID CVSS Vector Date
Bg Patriarchia BU <= 2.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51799 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Brand my Footer <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51801 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
AzonBox <= 1.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51931 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Assist24 Help Desk <= 20150401.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51910 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
audioCase <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51909 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Charity Addon for Elementor <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51938 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
BU Slideshow <= 2.3.10 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-52351 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Beacon For Help Scout <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51828 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Advanced Video Player with Analytics <= 1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51824 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
AA Audio Player <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-52348 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
WP Virtual Room Configurator <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51907 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Bread & Butter <= 7.4.857 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51802 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
BeBetter Social Icons <= 2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51880 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Loginplus <= 1.2 - Unauthenticated Stored Cross-Site Scripting CVE-2024-51782 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Master Bar <= 1.0 - Reflected Cross-Site Scripting CVE-2024-51698 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Doofinder <= 0.5.4 - Reflected Cross-Site Scripting CVE-2024-51697 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
UW Freelancer <= 0.1 - Reflected Cross-Site Scripting CVE-2024-51706 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Twitter real time search scrolling <= 7.0 - Reflected Cross-Site Scripting CVE-2024-51716 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Jigoshop – Store Toolkit <= 1.4.0 - Reflected Cross-Site Scripting CVE-2024-51712 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Narnoo Commerce Manager <= 1.6.0 - Reflected Cross-Site Scripting CVE-2024-51708 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation