Is "Tickera – WordPress Event Ticketing" safe?
WordPress Plugin security and safety information.
Rating: Good (current version safe)
Recommendations
Tickera – WordPress Event Ticketing: Plugin Details
Type: | Plugin |
Author: | Tickera.com |
URL: | https://wordpress.org/plugins/tickera-event-ticketing-system/ |
Latest Version: | 3.4.6.9 |
Tickera – WordPress Event Ticketing: Security Information
Insecure versions: | Up To 3.4.6.7 |
Known since: | 2020-04-13 12:55:34 |
Description: | All personal data from registered users of an event could be exported into a downloadable PDF file by an unauthenticated attacker. |
Tickera – WordPress Event Ticketing: Safety Recommendations
We have rated Tickera – WordPress Event Ticketing as Good (current version safe) which means that we have found vulnerabilities in older versions.
We recommend that you only use the latest version of Tickera – WordPress Event Ticketing.
Tickera – WordPress Event Ticketing: Staying Up-to-date
Make sure your installation of Tickera – WordPress Event Ticketing is safe with the following free Jetpack services for WordPress sites:
- Updates & Management
Turn on auto-updates for Tickera – WordPress Event Ticketing or manage in bulk. - Prevent Infiltrations
Automatic protection against brute force attacks and secure sign on.
Tickera – WordPress Event Ticketing: Keeping Safe
If you're running a business, ecommerce, news, or other critical website, Jetpack also provides additional indispensable services:
- Automated Backups
Full backup of your entire site with unlimited storage space. - Restores & Migrations
Restore or migrate your site from a backup with one click. - Security Scanning
Regular, automated scans of your site for malware, threats, and hacks. - Expert Support
Fast, priority support for any WordPress security issue.
About this information
This WordPress security information is part of our security library and is brought to you by Jetpack as part of our committment to a safer WordPress experience.
If you have any questions, please do not hesitate to contact us.