Ram

Organization: Wordfence

15
All Time Ranking
149
All Time Discoveries
Wordfence Vulnerability Researcher
Wordfence Vulnerability Researcher
November 8, 2023

Showing 61-80 of 149 Vulnerabilities

Title CVE ID CVSS Vector Date
Brizy - Page Builder <= 2.3.11 - Stored Cross-Site Scripting CVE-2021-38344 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N October 13, 2021
Brizy Page Builder <= 2.3.11 - Authenticated File Upload and Path Traversal CVE-2021-38346 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H October 13, 2021
Starter Templates — Elementor, Gutenberg & Beaver Builder Templates <= 2.7.0 - Missing Authorization to Stored Cross-Site Scripting CVE-2021-42360 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L October 4, 2021
WP DSGVO Tools (GDPR) <= 3.1.23 - Unauthenticated Arbitrary Post Deletion CVE-2021-42359 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H September 21, 2021
WP Statistics <= 13.1.1 - Cross-Site Request Forgery to Arbitrary Plugin Activation and Deactivation CVE-2021-4333 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N September 11, 2021
Gutenberg Template Library & Redux Framework <= 4.2.1 - Incorrect Authorization Leading to Arbitrary Plugin Installation and Post Deletion CVE-2021-38312 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L September 1, 2021
Gutenberg Template Library & Redux Framework <= 4.2.11 - Missing Authorization to Sensitive Information Disclosure CVE-2021-38314 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N September 1, 2021
Easy Social Icons <= 3.0.8 – Reflected Cross-Site Scripting CVE-2021-39322 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 1, 2021
underConstruction <= 1.18 - Reflected Cross-Site Scripting CVE-2021-39320 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 31, 2021
Nested Pages <= 3.1.15 - Open Redirect CVE-2021-38343 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N August 25, 2021
Nested Pages <= 3.1.15 - Cross-Site Request Forgery to Arbitrary Post Deletion and Modification CVE-2021-38342 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H August 25, 2021
WordPress Download Manager <= 3.1.24 - Authenticated File Upload CVE-2021-34639 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H July 29, 2021
WordPress Download Manager <= 3.1.24 - Cross-Site Scripting CVE-2021-34638 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N July 29, 2021
Google Language Translator <= 6.0.9 - Reflected Cross-Site Scripting 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L July 21, 2021
WP Fluent Forms < 3.6.67 - Stored Cross-Site Scripting CVE-2021-34620 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H June 16, 2021
Fancy Product Designer <= 4.6.8 - Unauthenticated Arbitrary File Upload CVE-2021-24370 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 1, 2021
WP Statistics <= 13.0.7 - Unauthenticated SQL Injection CVE-2021-24340 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N May 19, 2021
Happy Addons for Elementor <= 2.23.0 & Pro Version < 1.17.0 - Stored Cross-Site Scripting CVE-2021-24292 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 26, 2021
Clever Addons for Elementor <=2.0.15 - Stored Cross-Site Scripting CVE-2021-24273 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 15, 2021
Rife Elementor Extensions & Templates <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2021-24265 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 13, 2021

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation