Dmitrii Ignatyev

Organization: CleanTalk Inc

21
All Time Ranking
186
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

About

As a pentester, I possess a diverse range of skills that allow me to effectively assess and secure digital systems. My experience includes conducting audits of information systems, web applications, and network infrastructure and access points. I also have a strong background in moderating and promoting bug bounty platforms, helping to create a more secure online environment.

Showing 81-100 of 186 Vulnerabilities

Title CVE ID CVSS Vector Date
System Dashboard <= 2.8.9 - Reflected Cross-Site Scripting via X-Forwarded-For CVE-2023-7246 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N February 28, 2024
Contest Gallery < 21.2.8.1 - Unauthenticated Stored Cross-Site Scripting via headers CVE-2023-5307 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 10, 2023
Table of Contents Plus <= 2411 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-5578 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N October 15, 2024
Smart Post Show <= 3.0.0 - Authenticated (Editor+) Stored Cross-Site Scripting via Pagination Color CVE-2024-8187 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N October 8, 2024
WordPress Button Plugin MaxButtons <= 9.7.7 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-3026 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N June 22, 2024
Slider by 10Web <= 1.2.55 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-6026 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N June 20, 2024
Carousel Slider <= 2.2.10 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-4372 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N April 30, 2024
Floating Chat Widget <= 3.1.8 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-2972 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N April 3, 2024
Carousel Slider <= 2.2.6 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-1712 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N March 25, 2024
Ultimate Blocks <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Advanced Heading CVE-2024-3241 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N April 23, 2024
JSM file_get_contents() Shortcode <= 2.7.0 - Authenticated (Contributor+) Server-Side Request Forgery via Shortcode CVE-2023-6991 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N December 21, 2023
All Users Messenger <= 1.24 - Authenticated (Subscriber+) Insecure Direct Object Reference to Message Deletion CVE-2023-4023 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L August 7, 2023
Simple Job Board <= 2.12.5 - Unauthenticated Resumes Download CVE-2024-7762 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N September 13, 2024
Backup and Restore WordPress WordPress <= 1.45 - Unauthenticated Information Exposure via Log Files CVE-2023-7232 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N March 5, 2024
Error Log Viewer <= 1.1.2 - Sensitive Information Exposure CVE-2023-6821 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N February 20, 2024
Backup Bolt <= 1.3.0 - Sensitive Information Exposure CVE-2023-7236 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N February 20, 2024
WP STAGING WordPress Backup Plugin < 3.2.0 - Sensitive Information Exposure via cache files CVE-2023-7204 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N January 31, 2024
User Activity Tracking and Log <= 4.1.3 - IP Spoofing CVE-2024-0970 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 29, 2024
WP User Profile Avatar <= 1.0.0 - Authenticated (Author+) Insecure Direct Object Reference to Avatar Deletion/Update CVE-2023-6384 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 29, 2023
Debug Log Manager <= 2.2.2 - Directory Listing to Sensitive Information Disclosure CVE-2023-6383 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 13, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation