Data Tables Generator by Supsystic

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Access violation vulnerability in Data Tables Generator by Supsystic 1.10.36

    Fixed

    The Data Tables Generator plugin for WordPress has a security issue that allows unauthorized users to access it. This vulnerability affects all versions up to and including 1.10.36. This means that a...

    Read More
  • Access violation vulnerability in Data Tables Generator by Supsystic 1.10.31

    Fixed

    The Data Tables Generator plugin for WordPress, created by Supsystic, has a security flaw that allows unauthorized users to access it. This happens because the plugin does not check for proper permis...

    Read More
  • Input validation vulnerability in Data Tables Generator by Supsystic 1.9.91

    Fixed

    The Data Tables Generator by Supsystic plugin

    Read More
  • Input validation vulnerability in Data Tables Generator by Supsystic 1.9.91

    Fixed

    The data-tables-generator-by-supsystic plugin

    Read More
  • Access violation vulnerability in Data Tables Generator by Supsystic 1.10.25

    Fixed

    The Data Tables Generator by Supsystic plugin for WordPress has a security flaw in versions up to 1.10.25. This flaw allows people with subscriber-level access and higher to do something that they sho...

    Read More
  • Input validation vulnerability in Data Tables Generator by Supsystic 1.10.19

    Fixed

    The Data Tables Generator by Supsystic WordPress plugin before version 1.10.20 had a security flaw. It did not protect some of its Table settings from malicious code. This meant that users with high l...

    Read More
  • Input validation vulnerability in Data Tables Generator by Supsystic 1.9.99

    Fixed

    The Data Tables Generator by Supsystic plugin for WordPress is vulnerable to a type of security attack known as time-based blind SQL Injection. This type of attack can be used to access sensitive inf...

    Read More