Dave Jong

Organization: Patchstack

12
All Time Ranking
165
All Time Discoveries

Showing 1-20 of 165 Vulnerabilities

Title CVE ID CVSS Vector Date
WP Setup Wizard <= 1.0.8.1 - Authenticated (Subscriber+) Full Database Download CVE-2024-25917 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N February 14, 2024
WooCommerce Easy Checkout Field Editor, Fees & Discounts <= 3.5.12 - Unauthenticated Arbitrary File Upload CVE-2024-25925 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 14, 2024
WP Media folder <= 5.7.2 - Missing Authorization to Authenticated(Subscriber+) Plugin settings change CVE-2024-25907 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N February 12, 2024
MoveTo <= 6.2 - Unauthenticated SQL Injection CVE-2024-25910 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 12, 2024
MoveTo <= 6.2 - Unauthenticated Directory Traversal to Arbitrary File Deletion CVE-2024-25911 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 12, 2024
MoveTo <= 6.2 - Missing Authorization to Unauthenticated Options Update CVE-2024-25912 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 12, 2024
MoveTo <= 6.2 - Unauthenticated Arbitrary File Upload CVE-2024-25913 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 12, 2024
Coupon Referral Program <= 1.7.2 - Unauthenticated PHP Object Injection CVE-2024-25100 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 5, 2024
PowerPack Pro for Elementor <= 2.10.6 - Missing Authorization to Settings Reset CVE-2024-24844 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N February 2, 2024
PowerPack Pro for Elementor < 2.10.8 - Cross-Site Request Forgery to Plugin Settings Modification and Cross-Site Scripting CVE-2024-24843 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N February 2, 2024
SalesKing <= 1.6.15 - Missing Authorization to Settings Change CVE-2024-22156 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L January 16, 2024
SalesKing <= 1.6.15 - Unauthenticated Privilege Escalation CVE-2024-22157 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H January 16, 2024
SalesKing <= 1.6.15 - Unauthenticated Sensitive Information Exposure CVE-2024-22154 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N January 16, 2024
Profile Builder Pro <= 3.10.0 - Cross-Site Request Forgery CVE-2024-22140 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H January 10, 2024
Profile Builder Pro <= 3.10.0 - Authenticated (Subscriber+) Time-Based One-Time Password Sensitive Information Exposure CVE-2024-22141 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N January 10, 2024
Profile Builder Pro <= 3.10.0 - Reflected Cross-Site Scripting CVE-2024-22142 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N January 10, 2024
Booster Plus for WooCommerce < 7.1.2 - Missing Authorization to Order Information Disclosure CVE-2023-52231 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N January 5, 2024
Booster Plus for WooCommerce < 7.1.2 - Missing Authorization to Arbitrary Page/Post Deletion CVE-2023-52232 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L January 5, 2024
Booster Plus for WooCommerce < 7.1.3 - Missing Authorization to Arbitrary Options Disclosure CVE-2023-52230 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N January 5, 2024
Booster Elite for WooCommerce < 7.1.2 - Missing Authorization to Order Information Disclosure CVE-2023-52234 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N January 5, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation