{"uuid": "432a8e2e-386f-4b91-8b7b-e66603a5511b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3435", "type": "seen", "source": "https://t.me/cibsecurity/68498", "content": "\u203c CVE-2023-3435 \u203c\n\nThe User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T00:20:05.000000Z"}