Browse all 3 CVE security advisories affecting Peter Raschendorfer. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Peter Raschendorfer focuses on application security research, primarily identifying vulnerabilities in web applications and enterprise software. His CVE history reveals a pattern of discovering critical remote code execution and cross-site scripting flaws, often in authentication and session management components. While no major public incidents are directly attributed to him, his contributions highlight persistent issues in input validation and access control. His work consistently demonstrates how improper handling of user-supplied data can lead to complete system compromise, emphasizing the ongoing need for secure coding practices in development lifecycles.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-46470 | WordPress Smart Hashtags [#hashtagger] plugin <= 7.2.3 - Broken Access Control Vulnerability — Smart Hashtags [#hashtagger]CWE-862 | 4.3 | Medium | 2025-04-24 |
| CVE-2023-49771 | WordPress Smart External Link Click Monitor [Link Log] Plugin <= 5.0.2 is vulnerable to Cross Site Scripting (XSS) — Smart External Link Click Monitor [Link Log]CWE-79 | 7.1 | High | 2023-12-14 |
| CVE-2023-49770 | WordPress Smart External Link Click Monitor [Link Log] Plugin <= 5.0.2 is vulnerable to Cross Site Scripting (XSS) — Smart External Link Click Monitor [Link Log]CWE-79 | 5.9 | Medium | 2023-12-14 |
This page lists every published CVE security advisory associated with Peter Raschendorfer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.