Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34219 | The User Activity Log WordPress plugin before 1.6.3 does not properly sanitise and escape the `txtsearch` parameter before using it in a SQL statement in some admin pages, leading to a SQL injection exploitable by high privilege users such as admin. |
Thu, 24 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-24T15:03:30.446Z
Reserved: 2023-05-17T15:09:09.490Z
Link: CVE-2023-2761
Updated: 2024-08-02T06:33:05.512Z
Status : Modified
Published: 2023-07-24T11:15:09.733
Modified: 2024-11-21T07:59:14.417
Link: CVE-2023-2761
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD