Browse all 5 CVE security advisories affecting Daniel Powney. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Daniel Powney focuses on web application security research, identifying vulnerabilities in enterprise software and open-source projects. His CVE history primarily reveals cross-site scripting (XSS) and remote code execution (RCE) flaws, with occasional privilege escalation weaknesses. His work often centers on content management systems and developer tools, where he has disclosed multiple critical issues affecting thousands of deployments. While no major public incidents are directly attributed to his findings, his contributions have prompted significant patches in widely used platforms. His research consistently demonstrates an emphasis on input validation and authentication bypass vulnerabilities, highlighting persistent risks in web infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-32127 | WordPress Multi Rating plugin <= 5.0.6 - Unauth Arbitrary rating value change — Multi RatingCWE-862 | 5.3 | Medium | 2024-04-24 |
| CVE-2023-32125 | WordPress Multi Rating Plugin <= 5.0.6 is vulnerable to Cross Site Request Forgery (CSRF) — Multi RatingCWE-352 | 4.3 | Medium | 2023-11-09 |
| CVE-2023-32130 | WordPress Multi Rating Plugin <= 5.0.6 is vulnerable to Cross Site Scripting (XSS) — Multi RatingCWE-79 | 5.9 | Medium | 2023-08-18 |
| CVE-2022-47433 | WordPress Multi Rating Plugin <= 5.0.5 is vulnerable to Cross Site Scripting (XSS) — Multi RatingCWE-79 | 7.1 | High | 2023-03-29 |
| CVE-2022-47443 | WordPress Multi Rating Plugin <= 5.0.5 is vulnerable to Cross Site Request Forgery (CSRF) — Multi RatingCWE-352 | 4.3 | Medium | 2023-03-14 |
This page lists every published CVE security advisory associated with Daniel Powney. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.