Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
activity log project activity log vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-27858
CSV Injection vulnerability in Activity Log Team Activity Log <= 2.8.3 on WordPress.
Activity Log Project Activity Log
NA
CVE-2022-3941
A vulnerability has been found in Activity Log Plugin and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack can be ini...
Activity Log Project Activity Log -
NA
CVE-2023-4281
This Activity Log WordPress plugin prior to 2.8.8 retrieves client IP addresses from potentially untrusted headers, allowing an malicious user to manipulate its value. This may be used to hide the source of malicious traffic.
Activity Log Project Activity Log
1 Github repository
7.5
CVSSv2
CVE-2015-7857
SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 prior to 3.4.5 allows remote malicious users to execute arbitrary SQL commands via the list[select] parameter to index.php.
Joomla Joomla\\! 3.2.0
Joomla Joomla\\! 3.2.1
Joomla Joomla\\! 3.3.4
Joomla Joomla\\! 3.4.0
Joomla Joomla\\! 3.3.2
Joomla Joomla\\! 3.3.3
Joomla Joomla\\! 3.2.4
Joomla Joomla\\! 3.3.0
Joomla Joomla\\! 3.3.1
Joomla Joomla\\! 3.4.3
Joomla Joomla\\! 3.4.4
Joomla Joomla\\! 3.2.2
Joomla Joomla\\! 3.2.3
Joomla Joomla\\! 3.4.1
Joomla Joomla\\! 3.4.2
1 EDB exploit
14 Github repositories
1 Article
7.5
CVSSv2
CVE-2015-7858
SQL injection vulnerability in Joomla! 3.2 prior to 3.4.4 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.
Joomla Joomla\\! 3.4.0
Joomla Joomla\\! 3.3.3
Joomla Joomla\\! 3.3.4
Joomla Joomla\\! 3.3.1
Joomla Joomla\\! 3.3.2
Joomla Joomla\\! 3.2.4
Joomla Joomla\\! 3.4.3
Joomla Joomla\\! 3.3.0
Joomla Joomla\\! 3.2.2
Joomla Joomla\\! 3.2.3
Joomla Joomla\\! 3.4.2
Joomla Joomla\\! 3.4.1
Joomla Joomla\\! 3.2.0
Joomla Joomla\\! 3.2.1
1 EDB exploit
14 Github repositories
1 Article
7.5
CVSSv2
CVE-2015-7297
SQL injection vulnerability in Joomla! 3.2 prior to 3.4.4 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7858.
Joomla Joomla\\! 3.2.1
Joomla Joomla\\! 3.2.2
Joomla Joomla\\! 3.3.4
Joomla Joomla\\! 3.4.0
Joomla Joomla\\! 3.2.0
Joomla Joomla\\! 3.3.2
Joomla Joomla\\! 3.3.3
Joomla Joomla\\! 3.3.0
Joomla Joomla\\! 3.3.1
Joomla Joomla\\! 3.4.4
Joomla Joomla\\! 3.2.3
Joomla Joomla\\! 3.2.4
Joomla Joomla\\! 3.4.1
Joomla Joomla\\! 3.4.2
Joomla Joomla\\! 3.4.3
1 EDB exploit
14 Github repositories
1 Article
4
CVSSv2
CVE-2014-2665
includes/specials/SpecialChangePassword.php in MediaWiki prior to 1.19.14, 1.20.x and 1.21.x prior to 1.21.8, and 1.22.x prior to 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain...
Mediawiki Mediawiki 1.22.3
Mediawiki Mediawiki 1.22.2
Mediawiki Mediawiki 1.21.2
Mediawiki Mediawiki 1.21.3
Mediawiki Mediawiki 1.20.5
Mediawiki Mediawiki 1.20.6
Mediawiki Mediawiki 1.19
Mediawiki Mediawiki 1.19.0
Mediawiki Mediawiki 1.19.6
Mediawiki Mediawiki 1.19.7
Mediawiki Mediawiki 1.21.6
Mediawiki Mediawiki 1.21.5
Mediawiki Mediawiki 1.20.1
Mediawiki Mediawiki 1.20.2
Mediawiki Mediawiki
Mediawiki Mediawiki 1.19.12
Mediawiki Mediawiki 1.19.2
Mediawiki Mediawiki 1.19.3
Mediawiki Mediawiki 1.22.4
Mediawiki Mediawiki 1.21
Mediawiki Mediawiki 1.21.1
Mediawiki Mediawiki 1.20.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started