1337_Wannabe

Organization: home

121
All Time Ranking
25
All Time Discoveries
2
90 Day Published Submissions
20 Nov '24
Last Published Submission

About

i love code review and finding bugs in wordpress plugins

Submitted XSS Vulnerability
Submitted XSS Vulnerability
September 4, 2024
Submitted 10 Vulnerabilities
Submitted 10 Vulnerabilities
May 22, 2024
Resourceful Researcher
Resourceful Researcher
May 14, 2024
Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
April 27, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
April 2, 2024

Showing 21-25 of 25 Vulnerabilities

Title CVE ID CVSS Vector Date
Header Footer Code Manager Pro <= 1.0.16 - Reflected Cross-Site Scripting via message CVE-2024-3473 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
Essential Grid <= 3.1.1 - Unauthenticated Private Post Disclosure CVE-2024-3235 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N April 9, 2024
WP Activity Log Premium <= 4.6.4 - Authenticated (Subscriber+) SQL Injection CVE-2024-2018 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H April 9, 2024
LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection CVE-2024-2879 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H April 2, 2024
WPFront User Role Editor <= 3.2.1.11184 - Limited Information Exposure CVE-2024-2931 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N April 1, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation