Scheduling plugin Vulnerabilities

Security vulnerability tracking for Startbooking Scheduling plugin

Last updated: Jun 18, 2024
Total CVEs

1

Critical

0

With Exploits

1

Last 30 Days

0

Vulnerability Timeline

1 vulnerabilities discovered over time for Scheduling plugin

Severity Distribution

Critical0
0%
High0
0%
Medium1
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2024-16346.5

An attacker can disconnect the scheduling plugin from the startbooking service and erase important connection data without needing to log in. This vulnerability affects all versions up to 3.5.10 and requires no authentication, making it accessible to anyone on the internet.

startbookingscheduling plugin
Exploit Available
almost 2 years agoJun 18, 2024

About Startbooking Scheduling plugin Security

This page provides comprehensive security vulnerability tracking for Startbooking Scheduling plugin. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Scheduling plugin updated to the latest version
  • • Subscribe to security advisories from Startbooking
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately