Lana Codes

Vulnerabilities Discovered:

418
All Time Discoveries
44
Discoveries since Feb 25, 2023

Showing 1-20 of 418 vulnerabilities

Title CVE ID CVSS Vector Date
User Verification <= 1.0.93 - Privilege Escalation CVE-2022-4693 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 28, 2022
Drag and Drop Multiple File Upload for WooCommerce <= 1.0.8 - Cross-Site Request Forgery in upload and delete_file CVE-2022-45377 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H February 24, 2023
Drag and Drop Multiple File Upload – Contact Form 7 <= 1.3.6.5 - Cross-Site Request Forgery in dnd_upload_cf7_upload and dnd_codedropz_upload_delete CVE-2022-45364 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H February 24, 2023
Replyable – Subscribe to Comments and Reply by Email <= 2.2.9 - Cross-Site Request Forgery via prompt_dismiss_notice CVE-2022-4265 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H February 8, 2023
Uncanny Toolkit for LearnDash <= 3.6.4.1 - Cross-Site Request Forgery to Arbitrary Plugin Install and Activation CVE-2023-23714 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H January 27, 2023
WP Google Review Slider <= 11.7 - Authenticated (Subscriber+) SQL Injection CVE-2023-0259 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
WP Review Slider <= 12.1 - Authenticated (Subscriber+) SQL Injection CVE-2023-0260 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
WP Airbnb Review Slider <= 3.2 - Authenticated (Subscriber+) SQL Injection CVE-2023-0262 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
WP TripAdvisor Review Slider <= 10.7 - Authenticated (Subscriber+) SQL Injection CVE-2023-0261 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
Pinpoint Booking System <= 2.9.9.2.8 - Authenticated (Subscriber+) SQL Injection CVE-2023-0220 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
WP Yelp Review Slider <= 7.0 - Authenticated (Subscriber+) SQL Injection CVE-2023-0263 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 23, 2023
Crayon Syntax Highlighter <= 2.8.4 - Cross-Site Request Forgery CVE-2022-47167 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H January 13, 2023
Dashicons + Custom Post Types <= 1.0.2 - Missing Authorization CVE-2023-22674 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H January 13, 2023
Sunshine Photo Cart <= 2.9.13 - Cross-Site Request Forgery CVE-2022-40692 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H December 2, 2022
WP Mail Log <= 1.0.1 - Cross-Site Request Forgery CVE-2022-45807 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H December 2, 2022
WP OAuth Server (OAuth Authentication) <= 4.2.5 - Cross-Site Request Forgery CVE-2022-3926 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H November 10, 2022
WordPress REST API Authentication <= 2.4.0 - Cross-Site Request Forgery CVE-2022-45073 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H November 9, 2022
OAuth Client by DigitialPixies <= 1.1.0 - Cross-Site Request Forgery CVE-2022-3632 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H October 21, 2022
Advanced Order Export For WooCommerce <= 3.3.2 - Cross-Site Request Forgery CVE-2022-40128 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H October 20, 2022
Integration for Szamlazz.hu & WooCommerce <= 5.6.3.2 - Cross-Site Request Forgery CVE-2022-41685 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H October 20, 2022

Share this researcher's vulnerability discoveries

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation