Limit Login Attempts Project ≫ Limit Login Attempts
5 Schwachstellen gefunden.
CVE-2023-1861
- EPSS 0.15%
- Veröffentlicht 02.05.2023 08:15:10
- Zuletzt bearbeitet 30.01.2025 15:15:14
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attac...
CVE-2023-1912
- EPSS 1.39%
- Veröffentlicht 06.04.2023 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:40:07
The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for una...
CVE-2022-0787
- EPSS 47.25%
- Veröffentlicht 28.03.2022 18:15:09
- Zuletzt bearbeitet 21.11.2024 06:39:23
The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections
CVE-2021-24657
- EPSS 1.32%
- Veröffentlicht 20.09.2021 10:15:09
- Zuletzt bearbeitet 21.11.2024 05:53:30
The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthen...
CVE-2012-10001
- EPSS 0.77%
- Veröffentlicht 06.01.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 01:36:07
The Limit Login Attempts plugin before 1.7.1 for WordPress does not clear auth cookies upon a lockout, which might make it easier for remote attackers to conduct brute-force authentication attempts.