Ngo Van Thien

53
All Time Ranking
67
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 21-40 of 67 Vulnerabilities

Title CVE ID CVSS Vector Date
NOTICE BOARD <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-38460 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 14, 2022
Meet My Team <= 2.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37339 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
Torro Forms <= 1.0.16 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36791 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
History Timeline <= 1.0.5 - Authenticated (Author+) Stored Cross-Site Scripting CVE-2022-37328 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
Blossom Recipe Maker <= 1.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37338 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
WHA Crossword <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37330 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
Easy Org Chart <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36355 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
Gallery PhotoBlocks <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37407 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N August 10, 2022
amCharts: Charts and Maps <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36405 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N August 9, 2022
Team <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-34650 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 20, 2022
Testimonials <= 3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-33191 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N July 19, 2022
Popup | Custom Popup Builder <= 1.3.1 - Missing Capabilities Check CVE-2022-28612 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 14, 2022
XO Slider <= 3.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-32280 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 14, 2022
WordPress Team Manager <= 1.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-29406 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 14, 2022
Travel Management <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-27859 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N June 14, 2022
Hotel Booking < 3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-29443 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N May 26, 2022
Donations <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-29433 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N May 13, 2022
Contest Gallery <= 13.1.0.9 - Authenticated (Author+) Stored Cross-Site Scripting CVE-2022-27853 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N December 20, 2021
Testimonial Builder <= 1.6.1 - Authenticated Stored Cross-Site Scripting CVE-2021-36857 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 7, 2021
Final Tiles Gallery <= 3.4.18 - Authenticated Stored Cross-Site Scripting CVE-2020-14962 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N May 28, 2020

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation