minhtuanact

53
All Time Ranking
67
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 21-40 of 67 Vulnerabilities

Title CVE ID CVSS Vector Date
Order Your Posts Manually <= 2.2.5 - Authenticated (Administrator+) SQL Injection via 'sortdata' CVE-2023-32508 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H May 10, 2023
Order Your Posts Manually <= 2.2.5 - Reflected Cross-Site Scripting via '_user_request' CVE-2023-32510 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N May 10, 2023
Order Your Posts Manually <= 2.2.5 - Reflected Cross-Site Scripting via 'cat_id' CVE-2023-32509 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N May 10, 2023
Woo Custom Emails <= 2.2 - Missing Authorization to Unauthenticated Settings Change CVE-2023-32507 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 10, 2023
Ultimate Addons for Contact Form 7 <= 3.1.23 - Unauthenticated SQL Injection via form_id CVE-2022-47586 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 9, 2023
Radio Station <= 2.4.0.9 - Reflected Cross-Site Scripting CVE-2023-32499 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N May 9, 2023
Mass Email To users <= 1.1.4 - Unauthenticated Reflected Cross-Site Scripting via 'entrant' CVE-2022-47600 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 28, 2023
Maintenance Switch <= 1.5.2 - Reflected Cross-Site Scripting CVE-2022-47590 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 28, 2023
Advanced Category Template <= 0.1 - Stored Cross-Site Scripting via Cross-Site Request Forgery in _form.php CVE-2023-31072 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 24, 2023
Accessibility Suite by Online ADA <= 4.12 - Authenticated (Subscriber+) SQL Injection CVE-2022-47420 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H April 19, 2023
The School Management – Education & Learning Management <= 4.1 - Authenticated (Administrator+) SQL Injection CVE-2022-47430 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H April 19, 2023
Shortcode IMDB <= 6.0.8 - Authenticated (Administrator+) SQL Injection CVE-2022-47432 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H April 19, 2023
vSlider Multi Image Slider <= 4.1.2 - Cross-Site Request Forgery CVE-2023-22672 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L April 19, 2023
Kodex Posts likes <= 2.4.3 - Cross-Site Request Forgery CVE-2022-46814 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 19, 2023
Email Subscription Popup <= 1.2.16 - Reflected Cross-Site Scripting CVE-2023-30489 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 7, 2023
Amelia <= 1.0.75 - Unauthenticated Reflected Cross-Site Scripting via 'code' CVE-2023-29427 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 6, 2023
Product Catalog Simple <= 1.6.17 - Reflected Cross-Site Scripting CVE-2023-29388 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 6, 2023
Dynamics 365 Integration <= 1.3.13 - Missing Authorization via init CVE-2023-29422 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 6, 2023
PropertyHive <= 1.5.46 - Reflected Cross-Site Scripting via 'merge_ids' CVE-2023-29172 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 3, 2023
Magic Post Thumbnail <= 4.1.10 - Unauthenticated Stored Cross-Site Scripting CVE-2023-29171 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N April 3, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation