Логотип exploitDog
bind:CVE-2020-36716
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36716

Количество 2

Количество 2

nvd логотип

CVE-2020-36716

больше 2 лет назад

The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-p8fg-fxjr-7v2x

больше 2 лет назад

The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36716

The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.

CVSS3: 7.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-p8fg-fxjr-7v2x

The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.

CVSS3: 7.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу