Rio Darmawan

Organization: Zerobyte

11
All Time Ranking
190
All Time Discoveries

Showing 21-40 of 190 Vulnerabilities

Title CVE ID CVSS Vector Date
Conversational Forms for ChatBot <= 1.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-23981 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 20, 2023
Responsive Vertical Icon Menu <= 1.5.8 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-23870 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 20, 2023
WP-CommentNavi <= 1.12.1 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2023-22715 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 17, 2023
OOPSpam Anti-Spam <= 1.1.35 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2023-22716 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 17, 2023
Post View Count <= 2.0 - Cross-Site Request Forgery CVE-2023-44996 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L October 3, 2023
WP Forms Puzzle Captcha <= 4.1 - Cross-Site Request Forgery CVE-2023-44997 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L October 3, 2023
Responsive Gallery Grid <= 2.3.10 - Cross-Site Request Forgery CVE-2023-41659 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N September 1, 2023
Newsletters <= 4.8.8 - Cross-Site Request Forgery CVE-2023-30478 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N April 13, 2023
Etsy Shop <= 3.0.3 - Cross-Site Request Forgery to Plugin Settings Update CVE-2023-25975 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L February 22, 2023
Client Portal – Private user pages and login <= 1.1.8 - Cross-Site Request Forgery via cp_create_private_pages_for_all_users function CVE-2023-25968 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N February 22, 2023
Feed Them Social <= 3.0.2 - Cross-Site Request Forgery CVE-2023-25056 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L February 21, 2023
Publish to Schedule <= 4.4.2 - Cross-Site Request Forgery leading to Plugin Option Changes CVE-2023-25994 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N February 20, 2023
Shoppable Images <= 1.2.3 - Cross Site Request Forgery CVE-2023-25698 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N February 13, 2023
Schema App Structured Data <= 1.22.3 - Missing Authorization via page_init CVE-2023-44258 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N September 27, 2023
Slider Carousel – Responsive Image Slider <= 1.5.0 - Missing Authorization CVE-2023-25457 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N July 26, 2023
Button Generator – easily Button Builder <= 2.3.5 - Cross-Site Request Forgery in tools-data-base.php CVE-2023-25443 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N May 25, 2023
Fantastic Content Protector Free <= 2.6 - Missing Authorization via update_setting_fantastic_content_protector CVE-2023-25048 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N April 13, 2023
Advanced Text Widget <= 2.1.2 - Missing Authorization via atw_dismiss_admin_notice CVE-2023-26520 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N February 28, 2023
SAHU TikTok Pixel for E-Commerce <= 1.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-46642 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N October 25, 2023
WC Captcha <= 1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-46210 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N October 19, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation