Browse all 4 CVE security advisories affecting Plechev Andrey. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Andrey Plechev focuses on web application security research, primarily identifying vulnerabilities in content management systems and e-commerce platforms. His CVE history reveals a pattern of Remote Code Execution and Cross-Site Scripting flaws, often stemming from improper input validation and insecure deserialization. Notable characteristics include his methodical approach to testing complex authentication mechanisms and his documentation of privilege escalation vectors in popular PHP frameworks. While no major public incidents are directly attributed to his findings, his contributions have consistently addressed critical weaknesses in widely deployed software, highlighting persistent security gaps in web application development practices.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-35657 | WordPress WP-Recall plugin <= 16.26.6 - Cross Site Request Forgery (CSRF) vulnerability — WP-RecallCWE-352 | 5.4 | Medium | 2024-06-08 |
| CVE-2024-32709 | WordPress WP-Recall plugin <= 16.26.5 - SQL Injection vulnerability — WP-RecallCWE-89 | 9.3 | Critical | 2024-04-24 |
| CVE-2024-32710 | WordPress WP-Recall plugin <= 16.26.5 - SQL Injection vulnerability — WP-RecallCWE-89 | 8.5 | High | 2024-04-24 |
| CVE-2024-32604 | WordPress WP-Recall plugin <= 16.26.5 - Insecure Direct Object References (IDOR) vulnerability — WP-RecallCWE-639 | 4.3 | Medium | 2024-04-18 |
This page lists every published CVE security advisory associated with Plechev Andrey. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.