This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The WooCommerce Product Vendors plugin for WordPress, up to and including version 2.2.2, is vulnerable to unauthorized access. This means that an unauthenticated attacker could be able to take an act...
Read MoreThe WooCommerce Product Vendors plugin for WordPress is not secure in versions up to and including 2.2.1. An unauthenticated attacker can use this vulnerability to perform an unauthorized action with...
Read MoreThe WooCommerce Product Vendors plugin is vulnerable to a type of attack called SQL Injection in versions up to and including 2.1.78. This type of attack allows attackers with shop manager-level acce...
Read MoreThe WooCommerce Product Vendors plugin for WordPress is not secure in versions up to 2.1.76. Unauthenticated attackers could potentially inject malicious code into pages which would then run if a use...
Read MoreThe WooCommerce Product Vendors plugin for WordPress contains a vulnerability that makes it possible for attackers with vendor admin-level access to access sensitive information from the database. Th...
Read MoreThe WooCommerce Products Vendor plugin for WordPress is a tool that has a security vulnerability. In versions up to and including 2.1.65, it is possible for unauthenticated attackers to access the da...
Read MoreThe Product Vendors plugin versions up to and including 2.0.35 are vulnerable to a type of attack called Reflected Cross-Site Scripting. This type of attack can be used by someone who has not been au...
Read MoreThe WooCommerce Products Vendor plugin for WordPress is vulnerable to a security issue in certain versions. This issue allows vendors to change the commission percentage they get for sales. The vulne...
Read MoreThe WooCommerce Products Vendor plugin for WordPress has a security vulnerability in versions up to 2.1.65. This vulnerability is caused by an inadequate check on the "post_id" value used in the AJAX...
Read More