Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44099 | The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks. |
Wed, 09 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-09T13:21:07.606Z
Reserved: 2023-06-27T17:40:30.280Z
Link: CVE-2023-3435
Updated: 2024-08-02T06:55:03.386Z
Status : Modified
Published: 2023-08-14T20:15:11.747
Modified: 2024-11-21T08:17:15.720
Link: CVE-2023-3435
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD