Jean Tirstan T

142
All Time Ranking
20
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

20 Vulnerabilities

Title CVE ID CVSS Vector Date
Slider by Supsystic <= 1.8.10 - Authenticated (Admin+) SQL Injection CVE-2024-30237 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H March 26, 2024
Falang multilanguage <= 1.3.47 - Authenticated (Administrator+) SQL Injection CVE-2024-30495 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H March 28, 2024
SKT Skill Bar <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-38698 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 11, 2024
Team Members <= 5.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-38670 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 10, 2024
CodePen Embedded Pens Shortcode <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-37960 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 10, 2024
Bradmax Player <= 1.1.27 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-37957 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 10, 2024
Gallery Slideshow <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-37246 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 25, 2024
My Favorites <= 1.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-37114 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 20, 2024
B Slider - Slider for your block editor <= 1.1.12 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-30432 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 28, 2024
Creative Image Slider – Responsive Slider Plugin <= 2.1.3 - Reflected Cross-Site Scripting CVE-2024-30447 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N March 28, 2024
Booking Activities <= 1.15.19 - Reflected Cross-Site Scripting CVE-2024-30449 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N March 28, 2024
Table & Contact Form 7 Database – Tablesome <= 1.0.27 - Reflected Cross-Site Scripting CVE-2024-29110 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N March 16, 2024
Slider Hero <= 8.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-29922 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N March 25, 2024
Photo Gallery by Supsystic <= 1.15.16 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-29921 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N March 25, 2024
Accordions <= 2.3.5 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-37122 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N June 20, 2024
Shortcode Addons <= 3.2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-37121 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N June 20, 2024
Tabs <= 4.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-37120 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N June 20, 2024
Conversational Forms for ChatBot <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-34380 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N May 3, 2024
Image Slider <= 1.1.125 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2024-32707 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 22, 2024
Slider by Supsystic <= 1.8.10 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-30448 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N March 28, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation