Muhammad Daffa

19
All Time Ranking
127
All Time Discoveries

About

:)

Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
March 12, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
February 2, 2024

Showing 61-80 of 127 Vulnerabilities

Title CVE ID CVSS Vector Date
WooCommerce Weight Based Shipping <= 5.4.1 - Cross-Site Request Forgery leading to Plugin Settings Changes CVE-2022-46794 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L March 13, 2023
Product Feed PRO for WooCommerce <= 12.4.0 - Cross-Site Request Forgery via update_project CVE-2022-46793 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 22, 2023
Happy Addons for Elementor <= 3.8.2 - Cross-Site Request Forgery via handle_optin_optout() CVE-2023-28989 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 29, 2023
Health Check & Troubleshooting <= 1.5.1 - Cross-Site Request Forgery via health_check_troubleshoot_get_captures CVE-2022-47161 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L March 31, 2023
Shortlinks by Pretty Links <= 3.4.0 - Cross-Site Request Forgery via route CVE-2022-47149 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 13, 2023
Custom Order Numbers for WooCommerce <= 1.4.0 - Cross-Site Request Forgery CVE-2022-45367 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N April 14, 2023
Themify Portfolio Post <= 1.2.4 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2022-32970 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N April 18, 2023
YellowPencil Visual CSS Style Editor <= 7.5.8 - Reflected Cross-Site Scripting liveLink CVE-2022-33961 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 18, 2023
ShopEngine <= 4.1.1 - Cross-Site Request Forgery via get_product CVE-2022-45371 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L April 19, 2023
Simple Share Buttons Adder <= 8.4.6 - Cross-Site Request Forgery CVE-2022-47178 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 19, 2023
Ninja Tables <= 4.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings CVE-2022-47137 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 19, 2023
Ninja Tables <= 4.3.4 - Cross-Site Request Forgery CVE-2022-47136 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 20, 2023
Performance Lab <= 2.2.0 - Cross-Site Request Forgery via dismiss-wp-pointer CVE-2022-47174 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 18, 2023
Custom Twitter Feeds (Tweets Widget) <= 1.8.4 - Cross-Site Request Forgery CVE-2022-33974 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 25, 2023
Product Gallery Slider for WooCommerce <= 2.2.8 - Cross-Site Request Forgery CVE-2022-45372 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 25, 2023
Enhanced Text Widget <= 1.5.8 - Missing Authorization CVE-2023-23823 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N June 30, 2023
Visibility Logic for Elementor <= 2.3.4 - Cross-Site Request Forgery via toggle_option CVE-2022-47169 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 5, 2023
WooLentor <= 2.6.2 - Cross-Site Request Forgery via process_data CVE-2022-47172 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 5, 2023
Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification CVE-2023-25989 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 26, 2023
Royal Elementor Addons <= 1.3.75 - Cross-Site Request Forgery CVE-2022-47175 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 22, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation