Joaquin Ramirez Martinez

226
All Time Ranking
9
All Time Discoveries

9 Vulnerabilities

Title CVE ID CVSS Vector Date
Ultimate Product Catalog <= 3.8.1 - Missing Authorization to Plugin Settings Update 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N June 17, 2016
Booking Calendar Contact Form < 1.0.24 - Blind SQL Injection CVE-2016-10909 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H February 8, 2016
Booking Calendar Contact Form <= 1.0.23 - Reflected Cross-Site Scripting CVE-2016-10908 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N February 8, 2016
Booking Calendar Contact Form <= 1.0.23 - Shortcode SQL Injection 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H February 8, 2016
Appointment Booking Calendar <= 1.2.24 - SQL Injection 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H January 27, 2016
Appointment Booking Calendar <= 1.2.24 - Cross-Site Scripting 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N January 26, 2016
Contact Form Generator : Creative form builder for WordPress <= 2.1.86 - Cross-Site Request Forgery CVE-2015-6965 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L September 4, 2015
CP Image Store with Slideshow < 1.0.6 - Arbitrary File Download 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N July 10, 2015
CP Image Store with Slideshow < 1.0.7 - Arbitrary File Download 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N July 10, 2015

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation