From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: Loginizer Security and Loginizer <= 1.9.2 - Authentication Bypass 2. Severity Level: 8.1 (High) 3. CVE ID: CVE-2024-10097 4. CVSS Score: 3.1 5. Public Release Date: November 4, 2024 6. Update Date: November 5, 2024 7. Researcher: wesley (wcraft) 8. Affected Software Packages: - Loginizer - Loginizer Security 9. Fix Status: - Loginizer: Fixed - Loginizer Security: Fixed 10. Affected Versions: - Loginizer: <= 1.9.2 - Loginizer Security: <= 1.9.2 11. Fixed Versions: - Loginizer: 1.9.3 - Loginizer Security: 1.9.3 12. Description: Due to an authentication bypass vulnerability present in all versions of the Loginizer and Loginizer Security plugins, attackers can log in to any existing website using an email address and an existing account. 13. Reference Links: - loginizer.com - plugins.trac.wordpress.org - plugins.trac.wordpress.org 14. Sharing Options: Facebook, Twitter, LinkedIn, Email 15. Copyright and Licensing Information: - © Defiant Inc., 2012–2024 - © MITRE Corporation, 1999–2024 16. Contact Information: wfi-support@wordfence.com 17. Business Hours: 9am–8pm ET, 6am–5pm PT, 2pm–1am UTC/GMT (excluding weekends and holidays) 18. Customer Service: 24/7 support, 365 days a year, 1-hour response time This information helps users understand the vulnerability in detail, including its severity, affected software packages, fix status, and versions.