Dave Jong

Organization: Patchstack

12
All Time Ranking
206
All Time Discoveries

Showing 1-20 of 206 Vulnerabilities

Title CVE ID CVSS Vector Date
Otter Blocks PRO – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.11 - Authenticated (Subscriber+) Information Exposure CVE-2024-35682 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N June 6, 2024
Widget Options - Extended <= 5.1.0 & Widget Options <= 4.0.1 - Authenticated (Subscriber+) Information Disclosure CVE-2024-35691 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N June 6, 2024
WooCommerce Dropshipping <= 5.0.4 - Missing Authorization to Unauthenticated Arbitrary Email Send CVE-2024-35748 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N June 6, 2024
WP Visitors Tracker <= 2.3 - Reflected Cross-Site Scripting CVE-2024-35737 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N June 6, 2024
Checkout Field Editor for WooCommerce (Pro) <= 3.6.2 - Unauthenticated Arbitrary File Deletion CVE-2024-35658 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 3, 2024
WooCommerce AWeber Newsletter Subscription <= 4.0.2 - Missing Authorization to Access Token Modification CVE-2024-33944 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 30, 2024
WP Migrate Pro <= 2.6.10 - Unauthenticated PHP Object Injection CVE-2024-30225 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H April 26, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Cross-Site Request Forgery CVE-2024-33632 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 25, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Missing Authorization to Arbitrary Post/Page Deletion CVE-2024-33635 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L April 25, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Unauthenticated Server-Side Request Forgery CVE-2024-33634 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N April 25, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Reflected Cross-Site Scripting CVE-2024-33633 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-33631 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 25, 2024
XforWooCommerce <= 2.0.2 - Authenticated (Subscriber+) Local File Inclusion CVE-2024-33628 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H April 25, 2024
ARforms <= 6.4 - Reflected Cross-Site Scripting CVE-2024-32702 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 22, 2024
ARforms <= 6.4 - Authenticated (Subscriber+) SQL Injection CVE-2024-32706 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H April 22, 2024
ARForms <= 6.4 - Missing Authorization to Arbitrary Plugin Activation/Deactivation CVE-2024-32705 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 22, 2024
ARForms <= 6.4 - Missing Authorization to Arbitrary Option Deletion CVE-2024-32704 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L April 22, 2024
Max Addons Pro for Bricks <= 1.6.1 - Missing Authorization CVE-2024-32951 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 22, 2024
Max Addons Pro for Bricks <= 1.6.1 - Reflected Cross-Site Scripting CVE-2024-32952 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 22, 2024
ARForms <= 6.4 - Missing Authorization to Arbitrary File Deletion CVE-2024-32703 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H April 22, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation