revmakx CVE Vulnerabilities & Metrics

Focus on revmakx vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About revmakx Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with revmakx. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total revmakx CVEs: 6
Earliest CVE date: 06 Feb 2020, 17:15 UTC
Latest CVE date: 08 Jan 2025, 06:15 UTC

Latest CVE reference: CVE-2024-10585

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): -50.0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): -50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical revmakx CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.97

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 1
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS revmakx CVEs

These are the five CVEs with the highest CVSS scores for revmakx, sorted by severity first and recency.

All CVEs for revmakx

CVE-2024-10585 revmakx vulnerability CVSS: 0 08 Jan 2025, 06:15 UTC

The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory.

CVE-2023-6565 revmakx vulnerability CVSS: 0 29 Feb 2024, 01:42 UTC

The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.12.3 via the multi-call backup option. This makes it possible for unauthenticated attackers to extract sensitive data from a temporary SQL file via repeated GET requests during the limited time window of the backup process.

CVE-2023-2916 revmakx vulnerability CVSS: 0 15 Aug 2023, 09:15 UTC

The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including configuration. It can only be exploited if the plugin has not been configured yet. If combined with another arbitrary plugin installation and activation vulnerability, it may be possible to connect a site to InfiniteWP which would make remote management possible and allow for elevation of privileges.

CVE-2016-15004 revmakx vulnerability CVSS: 0 23 Jul 2022, 07:15 UTC

A vulnerability was found in InfiniteWP Client Plugin 1.5.1.3/1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to injection. The attack can be launched remotely. Upgrading to version 1.6.1.1 is able to address this issue. It is recommended to upgrade the affected component.

CVE-2021-25035 revmakx vulnerability CVSS: 4.3 24 Jan 2022, 08:15 UTC

The Backup and Staging by WP Time Capsule WordPress plugin before 1.22.7 does not sanitise and escape the error parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

CVE-2020-8772 revmakx vulnerability CVSS: 7.5 06 Feb 2020, 17:15 UTC

The InfiniteWP Client plugin before 1.9.4.5 for WordPress has a missing authorization check in iwp_mmb_set_request in init.php. Any attacker who knows the username of an administrator can log in.