Dhabaleshwar Das

16
All Time Ranking
143
All Time Discoveries

Showing 21-40 of 143 Vulnerabilities

Title CVE ID CVSS Vector Date
Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler <= 1.6.4 - Missing Authorization via Several AJAX Action CVE-2024-34826 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N May 9, 2024
Contact List – Easy Business Directory, Staff Directory and Address Book Plugin <= 2.9.87 - Missing Authorization to Notice Dismissal CVE-2024-34821 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 9, 2024
Barcode Scanner with Inventory & Order Manager <= 1.5.4 - Unauthenticated Information Exposure CVE-2024-34556 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N May 7, 2024
Barcode Scanner with Inventory & Order Manager <= 1.5.4 - Cross-Site Request Forgery CVE-2024-34557 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 7, 2024
Login with phone number <= 1.7.18 - Missing Authorization CVE-2024-34371 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N May 3, 2024
Restaurant and Cafe <= 1.2.1 - Cross-Site Request Forgery to Notice Dismissal CVE-2024-34379 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 3, 2024
Post Grid Master <= 3.4.7 - Missing Authorization CVE-2024-34372 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 3, 2024
iPanorama 360 WordPress Virtual Tour Builder <= 1.8.1 - Missing Authorization CVE-2024-33941 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N April 30, 2024
Debug Log Manager <= 2.3.1 - Missing Authorization via toggle_debugging CVE-2024-33915 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 29, 2024
Directorist <= 7.8.6 - Missing Authorization CVE-2024-33929 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 29, 2024
WidgetKit <= 2.5.0 - Missing Authorization to Notice Dismissal CVE-2024-33908 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 29, 2024
Hide Dashboard Notifications <= 1.2.3 - Cross-Site Request Forgery CVE-2024-33683 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 26, 2024
Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal CVE-2024-33685 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 26, 2024
ColibriWP Theme framework <= (Various Versions) - Missing Authorization CVE-2024-33686 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 26, 2024
Multiple Plugins by tychesoftwares <= (Various Versions) - Missing Authorization to Notice Dismissal CVE-2024-4233 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 26, 2024
Radio Station by netmix® – Manage and play your Show Schedule in WordPress! <= 2.5.7 - Cross-Site Request Forgery to Notice Dismissal CVE-2024-33689 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 26, 2024
Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation <= 2.15.3 - Cross-Site Request Forgery to Notice Dismissal CVE-2024-33691 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 26, 2024
Payment Gateway Based Fees and Discounts for WooCommerce <= 2.12.1 - Cross-Site Request Forgery to Notice Dismissal CVE-2024-33585 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 25, 2024
Smart Forms <= 2.6.91 - Missing Authorization to Notice Dismissal CVE-2024-33593 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N April 25, 2024
Financio <= 1.1.3 - Cross-Site Request Forgery to Notice Dismissal CVE-2024-33690 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 25, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation