Rein Daelman (trein)

359
All Time Ranking
6
All Time Discoveries
4
90 Day Published Submissions
15 Nov '24
Last Published Submission
Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
November 15, 2024
Submitted XSS Vulnerability
Submitted XSS Vulnerability
September 4, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
December 18, 2023

6 Vulnerabilities

Title CVE ID CVSS Vector Date
Backup and Staging by WP Time Capsule <= 1.22.21 - Unauthenticated Arbitrary File Upload CVE-2024-8856 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 15, 2024
E2Pdf <= 1.20.18 - Authenticated (Administrator+) PHP Object Injection CVE-2023-46154 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H October 17, 2023
Garden Gnome Package <= 2.2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-8657 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 23, 2024
Hash Form - Drag & Drop Form Builder <= 1.1.9 - Unauthenticated Limited File Upload CVE-2024-9417 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 4, 2024
String Locator <= 2.6.5 - Reflected Cross-Site Scripting CVE-2023-6987 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 23, 2024
Simple Membership <= 4.3.8 - Reflected Cross-Site Scripting Vulnerability via environment_mode CVE-2023-6882 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N December 18, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation