Show filters
104 Total Results
Displaying 31-40 of 104
Sort by:
Attacker Value
Unknown
CVE-2023-2761
Disclosure Date: July 24, 2023 (last updated October 08, 2023)
The User Activity Log WordPress plugin before 1.6.3 does not properly sanitise and escape the `txtsearch` parameter before using it in a SQL statement in some admin pages, leading to a SQL injection exploitable by high privilege users such as admin.
0
Attacker Value
Unknown
CVE-2023-2286
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated attackers to invoke this function via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2023-2285
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2023-2284
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers with subscriber-level or higher to make changes to the plugin's settings.
0
Attacker Value
Unknown
CVE-2023-2261
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails.
0
Attacker Value
Unknown
CVE-2020-36716
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.
0
Attacker Value
Unknown
CVE-2022-45074
Disclosure Date: April 23, 2023 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Paramveer Singh for Arete IT Private Limited Activity Reactions For Buddypress plugin <= 1.0.22 versions.
0
Attacker Value
Unknown
CVE-2022-34126
Disclosure Date: April 16, 2023 (last updated October 08, 2023)
The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.
0
Attacker Value
Unknown
CVE-2022-4550
Disclosure Date: February 27, 2023 (last updated February 24, 2025)
The User Activity WordPress plugin through 1.0.1 checks headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing
0
Attacker Value
Unknown
CVE-2021-32692
Disclosure Date: December 23, 2022 (last updated February 24, 2025)
Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file.
0