Mochamad Sofyan

283
All Time Ranking
8
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

8 Vulnerabilities

Title CVE ID CVSS Vector Date
Academy LMS <= 2.0.10 - Open Redirect CVE-2024-37234 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L June 21, 2024
BookingPress <= 1.0.82 - Missing Authorization to Appointment Time Alteration CVE-2024-34799 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 20, 2024
Academy LMS <= 1.9.16 - Missing Authorization CVE-2024-32714 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N April 22, 2024
Appointment Hour Booking <= 1.4.56 - Captcha Bypass CVE-2024-32720 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 22, 2024
Calendarista Basic Edition <= 3.0.5 - Missing Authorization CVE-2024-30534 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N March 29, 2024
EventPrime <= 3.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2024-29776 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N March 25, 2024
Calendarista Basic Edition <= 3.0.2 - Unauthenticated Cross-Site Scripting CVE-2024-27993 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N March 15, 2024
SupportCandy <= 3.2.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting CVE-2024-27991 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 15, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation