This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The plugin called "Ultimate Product Catalogue" for WordPress has a security issue. It is possible for someone without permission to change the settings of the plugin by tricking the site's administra...
Read MoreThe Ultimate Product Catalog plugin for WordPress is vulnerable to a type of security threat called Stored Cross-Site Scripting. This type of threat is present in versions 5.2.5 and earlier of the pl...
Read MoreThe Etoile Ultimate Product Catalog plugin
Read MoreThe Ultimate Product Catalog plugin for WordPress is not secure in versions up to 4.2.21. It is possible for malicious attackers to bypass authentication and carry out activities such as updating the...
Read MoreThe Ultimate Product Catalog plugin for WordPress is vulnerable to security issues. Before versions 3.1.2 and 4.2.22, attackers who don't have permission to use the website, or attackers who have per...
Read MoreThe Ultimate Product Catalog plugin for WordPress had a security issue in versions before 4.2.3. This issue made it possible for attackers who were logged in to the website to get access to sensitive...
Read MoreThe Ultimate Product Catalog plugin for WordPress has a security vulnerability that allows attackers with certain user permissions to change settings in the plugin. This issue affects all versions of...
Read MoreThe Ultimate Product Catalog plugin for WordPress is not secure in versions up to 2.1. Attackers with access to administrator-level permissions or higher can use the Catalogue_ID, SubCategory_ID, Sin...
Read MoreThe Ultimate Product Catalogue for WordPress is a tool used to organize and display product information on websites. Unfortunately, versions of the software prior to 3.1.3 have a security vulnerabili...
Read MoreThe Ultimate Product Catalog plugin for WordPress has security vulnerabilities in versions up to 3.1.2. These vulnerabilities could allow unauthenticated attackers to inject malicious code into pages...
Read More