5
All Time Ranking
416
All Time Discoveries
5
90 Day Published Submissions
11 Dec '24
Last Published Submission
Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
December 11, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
September 24, 2024

Showing 141-160 of 416 Vulnerabilities

Title CVE ID CVSS Vector Date
Comments Like Dislike <= 1.2.2 - IP Spoofing CVE-2024-25906 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N February 12, 2024
BEAR <= 1.1.4 - Missing Authorization via Several Functions CVE-2024-24835 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N February 2, 2024
BEAR <= 1.1.4 - Authenticated (Shop manager+) Stored Cross-Site Scripting via Plugin Options CVE-2024-24834 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N February 2, 2024
Quicksand Post Filter jQuery Plugin <= 3.1.1 - Missing Authorization via quicksand_admin_ajax CVE-2024-24850 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H February 2, 2024
Quicksand Post Filter jQuery Plugin <= 3.1.1 - Cross-Site Request Forgery via renderAdmin CVE-2024-24849 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N February 2, 2024
Email Before Download <= 6.9.7 - Cross-Site Request Forgery CVE-2024-23519 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 30, 2024
IP2Location Country Blocker <= 2.33.3 - Unauthenticated Sensitive Information Exposure via Debug Log File CVE-2024-22294 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N January 17, 2024
Stock Locations for WooCommerce <= 2.5.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings CVE-2024-22153 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N January 16, 2024
WP Spell Check <= 9.17 - Cross-Site Request Forgery CVE-2024-22143 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N January 12, 2024
Products & Order Export for WooCommerce <= 2.0.7 - Missing Authorization CVE-2024-31276 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N January 10, 2024
Wp Ultimate Review <= 2.3.5 - IP Spoofing CVE-2024-21746 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 5, 2024
Product Delivery Date for WooCommerce – Lite <= 2.7.0 - Missing Authorization CVE-2023-52210 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 3, 2024
Send Users Email <= 1.4.3 - Sensitive Information Exposure via Error Logs CVE-2023-52126 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N December 28, 2023
Conversios.io <= 6.5.0 - Missing Authorization CVE-2023-51357 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N December 26, 2023
MStore API <= 4.10.1 - Cross-Site Request Forgery CVE-2023-50878 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N December 26, 2023
Anti Hacker <= 4.34 - Cross-Site Request Forgery via antihacker_ajax_scan CVE-2023-50858 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N December 22, 2023
HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.4.3 - Cross-Site Request Forgery CVE-2023-50861 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N December 22, 2023
Clockwork SMS Notfications <= 3.0.4 - Authenticated(Administrator+) SQL Injection CVE-2023-50843 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
SlickNav Mobile Menu <= 1.9.2 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2023-51548 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N December 9, 2023
Webflow Pages <= 1.0.8 - Missing Authorization CVE-2023-49818 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N December 5, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation