Easy Appointments

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Easy Appointments 3.12.14

    Fixed

    The Easy Appointments plugin for WordPress has a security vulnerability that affects all versions up to 3.12.14. This means that anyone can use the plugin to run a code without proper validation, giv...

    Read More
  • Input validation vulnerability in Easy Appointments 3.11.18

    Fixed

    The Easy Appointments plugin for WordPress has a security issue that allows hackers to insert harmful code into web pages using the 'ea_full_calendar' feature. This can happen in any version up to an...

    Read More
  • Access violation vulnerability in Easy Appointments 3.11.18

    Fixed

    The Easy Appointments plugin for WordPress has a security issue that allows unauthorized changes to be made to data. This is because the plugin does not properly check the identity of the user on the...

    Read More
  • Input validation vulnerability in Easy Appointments 1.12.0

    Fixed

    The Easy Appointments plugin for WordPress

    Read More
  • Input validation vulnerability in Easy Appointments 3.11.0

    Fixed

    The Easy Appointments plugin for WordPress is vulnerable to a type of cyber attack known as Stored Cross-Site Scripting. This type of attack can happen when versions of the plugin up to and including ...

    Read More
  • Input validation vulnerability in Easy Appointments 1.1.4

    Fixed

    The Easy Appointments plugin for WordPress is not secure in versions up to 3.11.9. This means that unauthenticated attackers can change the plugin settings without being authorized to do so. All an at...

    Read More
  • Input validation vulnerability in Easy Appointments 3.10.7

    Fixed

    The Easy Appointment plugin for WordPress can be exploited by attackers with certain permissions to insert malicious web scripts into pages. This could allow the attackers to view

    Read More