Ngo Van Thien

46
All Time Ranking
67
All Time Discoveries

Showing 41-60 of 67 Vulnerabilities

Title CVE ID CVSS Vector Date
Easy Org Chart <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36355 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
Blossom Recipe Maker <= 1.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37338 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
Word Search Puzzles game <= 2.0.1 - Authenticated (Author+) Stored Cross-Site Scripting CVE-2022-37335 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N September 1, 2022
WHA Crossword <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37330 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 1, 2022
Meet My Team <= 2.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-37339 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
Torro Forms <= 1.0.16 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36791 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
History Timeline <= 1.0.5 - Authenticated (Author+) Stored Cross-Site Scripting CVE-2022-37328 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 2, 2022
NOTICE BOARD <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-38460 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 14, 2022
Awesome Filterable Portfolio <= 1.9.7 - Unauthenticated Stored Cross-Site Scripting CVE-2022-40193 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 15, 2022
Awesome Filterable Portfolio <= 1.9.7 - Missing Authorization to Plugin Settings Change CVE-2022-35238 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N September 15, 2022
GS Testimonial Slider <= 1.9.6 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-40213 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 15, 2022
Pop-Up Chop Chop <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-41638 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 27, 2022
Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery CVE-2021-36854 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H September 29, 2022
Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress <= 7.3.4 - Insecure Direct Object Reference CVE-2021-36865 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N September 29, 2022
Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery CVE-2021-36855 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H September 29, 2022
Booking Ultra Pro <= 1.1.8 - Stored Cross-Site Scripting CVE-2021-36854 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 29, 2022
Quiz And Survey Master <= 7.3.4 - Reflected Cross-Site Scripting CVE-2021-36864 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 21, 2022
WP Page Builder <= 1.2.6 - Authenticated (Author+) Stored Cross-Site Scripting CVE-2022-40963 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N October 21, 2022
Quiz And Survey Master <= 7.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2021-36863 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N October 21, 2022
Gallery with thumbnail slider <= 6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-42485 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N October 27, 2022

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation