Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

peterschulznl — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting peterschulznl. AI-powered Chinese analysis, POCs, and references for each vulnerability.

peterschulznl is a security researcher focused on identifying vulnerabilities in web applications and software systems. Their core use case involves discovering and reporting security flaws to improve software safety. Historically, peterschulznl has commonly found remote code execution (RCE), cross-site scripting (XSS), and privilege escalation vulnerabilities across various platforms. Their contributions include three CVEs, demonstrating consistent engagement with vulnerability disclosure. While no major public security incidents are directly linked to peterschulznl, their work highlights ongoing risks in application security. The researcher's findings emphasize the need for robust input validation, secure coding practices, and proper access controls to prevent exploitation of common vulnerability classes.

CVE IDTitleCVSSSeverityPublished
CVE-2026-0557 WP Data Access <= 5.5.63 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'wpda_app' Shortcode — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-79 6.4 Medium2026-02-14
CVE-2024-12428 WP Data Access – App, Table, Form and Chart Builder plugin <= 5.5.22 - Unauthenticated SQL Injection — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-89 7.5 High2024-12-25
CVE-2023-1874 WP Data Access <= 5.3.7 - Authenticated (Subscriber+) Privilege Escalation — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-266 7.5 High2023-04-12

This page lists every published CVE security advisory associated with peterschulznl. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.