ARPrice - WordPress Pricing Table Plugin

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.0.3

    Open

    The ARPrice plugin for WordPress has a security issue in versions up to 4.0.3. This means that hackers can access sensitive information from the website's database by adding their own commands to the...

    Read More
  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.0.3

    Open

    The ARPrice plugin for WordPress has a security issue that allows attackers to inject harmful code into websites. This can happen when the plugin processes information that is not trustworthy. Attack...

    Read More
  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.0.3

    Open

    The ARPrice plugin for WordPress has a security issue in versions 4.0.3 and below. This is because the plugin does not properly protect against harmful code from being added to the database. As a res...

    Read More
  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.0.3

    Open

    The ARPrice plugin for WordPress has a security issue that allows hackers to inject harmful code into the system. This can be done by submitting unsafe information. The vulnerability affects versions...

    Read More
  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.0.3

    Open

    The ARPrice plugin for WordPress is not safe from a type of cyber attack called Reflected Cross-Site Scripting. This can happen in any version of the plugin up to version 4.0.3 because the plugin doe...

    Read More
  • Input validation vulnerability in ARPrice - WordPress Pricing Table Plugin 4.1.3

    Open

    The ARPrice plugin for WordPress has a security issue in versions up to and including 4.1.3. This means that attackers with contributor-level access or higher can insert harmful code into web pages, ...

    Read More