Dave Jong

Organization: Patchstack

11
All Time Ranking
260
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 181-200 of 260 Vulnerabilities

Title CVE ID CVSS Vector Date
LoginPress Pro < 3.0 - Missing Authorization to License Status Update CVE-2024-32677 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 17, 2024
Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated WordPress Settings Update CVE-2024-31244 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 5, 2024
Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated WordPress Settings Deletion CVE-2024-31243 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L April 5, 2024
Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated Arbitrary Email Sending CVE-2024-31242 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 5, 2024
Wholesale For WooCommerce <= 2.3.0 - Unauthenticated Information Exposure CVE-2024-30469 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N March 28, 2024
BuddyBoss Theme <= 2.4.60 - Missing Authorization CVE-2023-51477 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N December 27, 2023
Perfmatters <= 2.1.6 - Missing Authorization CVE-2023-47874 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N November 20, 2023
Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation CVE-2023-32959 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 16, 2023
Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation CVE-2023-32959 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 16, 2023
Easing Slider <= 3.0.8 - Missing Authorization to Unauthenticated Settings Reset CVE-2023-30490 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 16, 2023
Community by PeepSo <= 6.0.9.0 - Missing Authorization to Sensitive Information Exposure CVE-2023-27630 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N May 5, 2023
Blogger Buzz <= 1.2.4 - Missing Authorization via activate_plugin CVE-2023-30476 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 13, 2023
Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Captcha Bypass CVE-2023-23730 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 23, 2023
Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Email Spoofing CVE-2023-23738 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 23, 2023
Resoto <= 1.0.8 - Missing Authorization leading to Authenticated (Subscriber+) Arbitrary Plugin Activation CVE-2023-28619 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N March 22, 2023
Droip <= 1.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Settings Change CVE-2024-43954 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N August 26, 2024
WP Armour Extended <= 1.26 - Cross-Site Request Forgery CVE-2024-43947 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 26, 2024
WHMpress <= 6.2-revision-5 - Missing Authorization to Authenticated (Subscriber+) Settings Update CVE-2024-43247 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N August 12, 2024
Bit Form Pro <= 2.6.4 - Authenticated (Subscriber+) Sensitive Information Exposure CVE-2024-43251 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N August 12, 2024
Leopard - WordPress offload media <= 2.0.36 - Authenticated (Subscriber+) Sensitive Information Exposure CVE-2024-43257 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N August 12, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation