Dimas Maulana

37
All Time Ranking
112
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 1-20 of 112 Vulnerabilities

Title CVE ID CVSS Vector Date
Ads Booster by Ads Pro <= 1.12 - Unauthenticated Local File Inclusion CVE-2024-52428 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 15, 2024
Sitepact's Contact Form 7 Extension For Klaviyo <= 1.0.5 - Unauthenticated SQL Injection CVE-2024-25928 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 15, 2024
postMash – custom post order <= 1.2.0 - Unauthenticated SQL Injection CVE-2024-25927 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 15, 2024
Disable Comments | WPZest <= 1.51 - Authenticated (Administrator+) SQL Injection CVE-2024-32135 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H April 12, 2024
Xserver Migrator <= 1.6.2 - Cross-Site Request Forgery to Arbitrary File Upload CVE-2024-33913 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H April 29, 2024
Fontific | Google Fonts <= 0.1.6 - Cross-Site Request Forgery via ajax_fontific_save_all CVE-2024-27194 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N February 26, 2024
Watermark RELOADED <= 1.3.5 - Cross-Site Request Forgery via optionsPage CVE-2024-27195 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N February 26, 2024
Custom Dashboard Widgets <= 1.3.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting via cdw_DashboardWidgets CVE-2024-22290 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N January 16, 2024
WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3.4 - Unauthenticated Arbitrary Shortcode Execution CVE-2024-50450 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L October 24, 2024
Sticky Anything <= 2.1.5 - Missing Authorization CVE-2024-33646 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N April 25, 2024
WP-Cufon <= 1.6.10 - Unauthenticated Stored Cross-Site Scripting CVE-2024-32541 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N April 15, 2024
SimpleMap Store Locator <= 2.6.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-22282 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N January 16, 2024
User Feedback <= 1.0.9 - Unauthenticated Cross-Site Scripting CVE-2023-46153 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N October 17, 2023
Better Anchor Links <= 1.7.5 - Cross-Site Request Forgery via admin/options.php CVE-2024-22287 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N January 16, 2024
Sliding Widgets <= 1.5.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting CVE-2024-33938 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 29, 2024
CURCY <= 2.2.3 - Reflected Cross-Site Scripting CVE-2024-49283 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 15, 2024
WP Bulk Delete <= 1.3.1 - Reflected Cross-Site Scripting CVE-2024-47352 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 30, 2024
YellowPencil Visual CSS Style Editor <= 7.6.4 - Reflected Cross-Site Scripting CVE-2024-47348 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 30, 2024
BA Book Everything <= 1.6.20 - Reflected Cross-Site Scripting CVE-2024-47360 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 30, 2024
Robokassa payment gateway for Woocommerce <= 1.6.1 - Reflected Cross-Site Scripting CVE-2024-47395 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 30, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation