Rafie Muhammad

Organization: Patchstack

2
All Time Ranking
559
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 321-340 of 559 Vulnerabilities

Title CVE ID CVSS Vector Date
Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery CVE-2023-48762 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N November 28, 2023
JetBlocks For Elementor <= 1.3.8 - Reflected Cross Site Scripting CVE-2023-48756 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 28, 2023
JetElements For Elementor <= 2.6.13 - Missing Authorization to Unauthenticated Arbitrary Attachment Download CVE-2023-48759 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N November 28, 2023
Mollie Payments for WooCommerce <= 7.3.11 - Authenticated (Shop Manager+) Arbitrary File Upload CVE-2023-6090 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H November 27, 2023
Salient Core <= 2.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2023-48749 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 24, 2023
Salient Core <= 2.0.2 - Reflected Cross-Site Scripting CVE-2023-48748 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 24, 2023
Yoast SEO <= 21.0 - Authenticated (Seo Manager+) Stored Cross-Site Scripting CVE-2023-40680 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N November 24, 2023
Porto Theme - Functionality <= 2.11.1 - Missing Authorization CVE-2023-48739 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N November 23, 2023
Porto Theme - Functionality <= 2.11.1 - Unauthenticated SQL Injection CVE-2023-48738 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 23, 2023
Enfold <= 5.6.4 - Reflected Cross-Site Scripting CVE-2023-38400 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 23, 2023
Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload CVE-2023-48275 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H November 22, 2023
CataBlog <= 1.7.0 - Authenticated (Editor+) Arbitrary File Deletion CVE-2023-47843 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H November 20, 2023
CataBlog <= 1.7.0 - Authenticated (Editor+) Arbitrary File Upload CVE-2023-47842 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H November 20, 2023
WP Githuber MD <= 1.16.2 - Authenticated (Author+) Arbitrary File Upload CVE-2023-47846 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H November 20, 2023
Jetpack <= 12.6.2 - Improper Authorization via WPCom External Media REST endpoints CVE-2023-47788 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N November 16, 2023
Jetpack < 12.7 - Authenticated(Contributor+) Clickjacking via Iframe Injection CVE-2023-47774 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N November 16, 2023
Jetpack <= 12.8-a.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via block attribute CVE-2023-45050 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 16, 2023
Phlox Shop <= 2.0.0 - Unauthenticated Local File Inclusion CVE-2023-39163 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 15, 2023
Phlox Portfolio <= 2.3.1 - Unauthenticated Local File Inclusion CVE-2023-38399 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 15, 2023
Shortcodes and extra features for Phlox theme <= 2.14.0 - Unauthenticated Local File Inclusion CVE-2023-37888 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 15, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation