TableOn – WordPress Posts Table Filterable 

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.4.2

    Open

    The TableOn plugin for WordPress has a security vulnerability in all versions up to 1.0.4.2. This means that anyone can run code without proper validation, allowing them to execute any code they want...

    Read More
  • Input validation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.4.1

    Fixed

    The TableOn - WordPress Posts Table Filterable plugin for WordPress has a security issue that allows hackers to insert harmful code into a website's pages. This can happen because the plugin does not...

    Read More
  • Input validation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.3

    Fixed

    The TableOn – WordPress Posts Table Filterable plugin for WordPress has a security issue where hackers can insert harmful code into web pages without being detected. This can happen in all versions...

    Read More
  • Input validation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.4

    Fixed

    The TableOn plugin for WordPress, specifically versions up to 1.0.4, has a vulnerability that could allow attackers to inject a harmful PHP Object. This could potentially give them access to sensitiv...

    Read More
  • Access violation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.4

    Fixed

    A popular WordPress plugin called TableOn – WordPress Posts Table Filterable has a security issue. This means that anyone with a certain level of access, even if they are not supposed to, can do so...

    Read More
  • Input validation vulnerability in TableOn – WordPress Posts Table Filterable  1.0.1

    Fixed

    The TableOn – WordPress Posts Table Filterable plugin for WordPress has a vulnerability that could allow unauthenticated attackers to inject malicious scripts into pages. This vulnerability affects...

    Read More