WordPress Plugin Count per Day is prone to an arbitrary file download and a cross-site scripting vulnerability because it fails to sufficiently verify and sanitize user-supplied data. Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Count per Day versions prior to 3.1.1 are vulnerable.
Update to plugin version 3.1.1 or latest
WordPress Plugin Checklist Cross-Site Scripting (1.1.5)
WordPress Plugin Autoship Cloud PHP Object Injection (1.0.13)
WordPress Plugin Social Share Icons & Social Share Buttons Unspecified Vulnerability (1.4)
Drupal Core 5.x Multiple Security Bypass Vulnerabilities (5.0 - 5.22)