Muhammad Daffa

19
All Time Ranking
127
All Time Discoveries

About

:)

Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
March 12, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
February 2, 2024

Showing 1-20 of 127 Vulnerabilities

Title CVE ID CVSS Vector Date
Product Feed Manager <= 7.3.15 - Authenticated (Admin+) Directory Traversal CVE-2023-52144 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N December 28, 2023
Comments - wpDiscuz <= 7.3.11 Sensitive Information Disclosure CVE-2022-23984 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N February 10, 2022
Event Tickets and Registration <= 5.8.1 - Missing Authorization CVE-2024-1053 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N February 21, 2024
RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.4.1 - Missing Authorization CVE-2024-1092 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N February 2, 2024
Table of Contents Plus <= 2302 - Cross-Site Request Forgery CVE-2023-44473 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N September 29, 2023
Royal Elementor Addons <= 1.3.75 - Cross-Site Request Forgery CVE-2022-47175 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 22, 2023
Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification CVE-2023-25989 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 26, 2023
Visibility Logic for Elementor <= 2.3.4 - Cross-Site Request Forgery via toggle_option CVE-2022-47169 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 5, 2023
WooLentor <= 2.6.2 - Cross-Site Request Forgery via process_data CVE-2022-47172 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 5, 2023
Enhanced Text Widget <= 1.5.8 - Missing Authorization CVE-2023-23823 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N June 30, 2023
Custom Twitter Feeds (Tweets Widget) <= 1.8.4 - Cross-Site Request Forgery CVE-2022-33974 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 25, 2023
Product Gallery Slider for WooCommerce <= 2.2.8 - Cross-Site Request Forgery CVE-2022-45372 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 25, 2023
Performance Lab <= 2.2.0 - Cross-Site Request Forgery via dismiss-wp-pointer CVE-2022-47174 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 18, 2023
Ninja Tables <= 4.3.4 - Cross-Site Request Forgery CVE-2022-47136 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 20, 2023
Simple Share Buttons Adder <= 8.4.6 - Cross-Site Request Forgery CVE-2022-47178 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 19, 2023
Shortlinks by Pretty Links <= 3.4.0 - Cross-Site Request Forgery via route CVE-2022-47149 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 13, 2023
Happy Addons for Elementor <= 3.8.2 - Cross-Site Request Forgery via handle_optin_optout() CVE-2023-28989 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 29, 2023
Product Feed PRO for WooCommerce <= 12.4.0 - Cross-Site Request Forgery via update_project CVE-2022-46793 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 22, 2023
Print Invoice & Delivery Notes for WooCommerce <= 4.7.2 - Cross-Site Request Forgery via ts_reset_tracking_setting CVE-2022-46795 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 13, 2023
When Last Login <= 1.2.1 - Cross-Site Request Forgery via wll_hide_subscription_notice CVE-2023-27461 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 1, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation