Dmitrii Ignatyev

Organization: CleanTalk Inc

22
All Time Ranking
155
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

About

As a pentester, I possess a diverse range of skills that allow me to effectively assess and secure digital systems. My experience includes conducting audits of information systems, web applications, and network infrastructure and access points. I also have a strong background in moderating and promoting bug bounty platforms, helping to create a more secure online environment.

Showing 101-120 of 155 Vulnerabilities

Title CVE ID CVSS Vector Date
Fatal Error Notify <= 1.5.2 - Cross-Site Request Forgery to Test Error Email Sending 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N January 30, 2024
User Activity Tracking and Log <= 4.1.3 - IP Spoofing CVE-2024-0970 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 29, 2024
FastDup <= 2.1.9 - Sensitive Information Exposure via Directory Listing CVE-2023-6592 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H January 16, 2024
WP Register Profile With Shortcode <= 3.5.9 - Cross-Site Request Forgery to User Password Reset CVE-2023-5448 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H January 10, 2024
TJ Shortcodes 0.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode CVE-2023-6530 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N January 3, 2024
WP User Profile Avatar <= 1.0.0 - Authenticated (Author+) Insecure Direct Object Reference to Avatar Deletion/Update CVE-2023-6384 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 29, 2023
JSM file_get_contents() Shortcode <= 2.7.0 - Authenticated (Contributor+) Server-Side Request Forgery via Shortcode CVE-2023-6991 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N December 21, 2023
WP Clone <= 2.4.2 - Sensitive Information Exposure CVE-2023-6750 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 18, 2023
BackWPup <= 4.0.3 - Sensitive Information Exposure CVE-2023-7164 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N December 18, 2023
Debug Log Manager <= 2.2.2 - Directory Listing to Sensitive Information Disclosure CVE-2023-6383 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 13, 2023
Backup Migration <= 1.3.5 - Unauthenticated Sensitive Information Exposure CVE-2023-6271 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 7, 2023
System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_constants) CVE-2023-5710 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N December 6, 2023
System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_global_value) CVE-2023-5712 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N December 6, 2023
System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_db_specs) CVE-2023-5714 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N December 6, 2023
System Dashboard <= 2.8.8 - Missing Authorization to Information Disclosure (sd_php_info) CVE-2023-5711 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N December 6, 2023
System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_option_value) CVE-2023-5713 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N December 6, 2023
WP STAGING WordPress Backup Plugin Free <= 3.1.2 and Pro <= 5.1.2 - Sensitive Information Exposure CVE-2023-6113 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 6, 2023
Duplicator <= 1.5.7 AND Duplicator Pro < 4.5.14.2 - Unauthenticated Sensitive Information Exposure CVE-2023-6114 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 4, 2023
Debug Log Manager <= 2.2.0 - Cross-Site Request Forgery CVE-2023-5772 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N November 29, 2023
Prime Mover <= 1.9.2 - Sensitive Information Exposure via Directory Listing CVE-2023-6505 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N November 24, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation