LVT-tholv2k

26
All Time Ranking
115
All Time Discoveries

Showing 1-20 of 115 Vulnerabilities

Title CVE ID CVSS Vector Date
WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection CVE-2024-32709 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H April 22, 2024
ProfileGrid <= 5.7.8 - Unauthenticated SQL Injection CVE-2024-30490 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H March 28, 2024
CRM Perks Forms <= 1.1.4 - Unauthenticated SQL Injection CVE-2024-30498 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H March 28, 2024
WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Authenticated (Contributor+) SQL Injection CVE-2024-32710 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H April 22, 2024
Slideshow Gallery <= 1.7.8 - Authenticated (Contributor+) SQL Injection CVE-2024-31355 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H April 7, 2024
Easy Form Builder <= 3.7.4 - Authenticated (Contributor+) SQL Injection CVE-2024-30535 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 29, 2024
ProfileGrid <= 5.7.8 - Authenticated (Subscriber+) SQL Injection CVE-2024-30491 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 28, 2024
CRM Perks Forms <= 1.1.4 - Authenticated (Contributor+) SQL Injection CVE-2024-30499 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 28, 2024
WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.17 - Authenticated (Contributor+) SQL Injection CVE-2024-30497 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 28, 2024
Zotpress <= 7.3.7 - Authenticated (Contributor+) SQL Injection CVE-2024-30488 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 28, 2024
Photos and Files Contest Gallery <= 21.3.2 - Authenticated (Contributor+) SQL Injection CVE-2024-30238 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 26, 2024
Zoho Campaigns <= 2.0.6 - Authenticated (Contributor+) SQL Injection CVE-2024-30239 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H March 26, 2024
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.26 - Authenticated (Contributor+) PHP Object Injection CVE-2024-30222 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H March 26, 2024
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.26 - Unauthenticated PHP Object Injection CVE-2024-30223 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H March 26, 2024
Active Products Tables for WooCommerce <= 1.0.6 - Unauthenticated PHP Object Injection CVE-2023-51505 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 27, 2023
Church Admin <= 4.0.27 - Authenticated (Contributor+) SQL Injection CVE-2024-30244 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H March 26, 2024
Tourfic <= 2.11.17 - Authenticated (Subscriber+) PHP Object Injection CVE-2024-29136 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H March 18, 2024
Tourfic <= 2.11.15 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2024-29135 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H March 18, 2024
WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution CVE-2024-27972 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H March 13, 2024
Slivery Extender <= 1.0.2 - Authenticated(Contributor+) Remote Code Execution via shortcode CVE-2024-27191 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H February 26, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation