Show filters
114 Total Results
Displaying 31-40 of 114
Sort by:
Attacker Value
Unknown
CVE-2012-10010
Disclosure Date: April 09, 2023 (last updated February 24, 2025)
A vulnerability was found in BestWebSoft Contact Form 3.21. It has been classified as problematic. This affects the function cntctfrm_settings_page of the file contact_form.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.22 is able to address this issue. The identifier of the patch is 8398d96ff0fe45ec9267d7259961c2ef89ed8005. It is recommended to upgrade the affected component. The identifier VDB-225321 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2013-10022
Disclosure Date: April 05, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as problematic, has been found in BestWebSoft Contact Form Plugin 3.51 on WordPress. Affected by this issue is the function cntctfrm_display_form/cntctfrm_check_form of the file contact_form.php. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.52 is able to address this issue. The patch is identified as 642ef1dc1751ab6642ce981fe126325bb574f898. It is recommended to upgrade the affected component. VDB-225002 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-0820
Disclosure Date: April 03, 2023 (last updated February 24, 2025)
The User Role by BestWebSoft WordPress plugin before 1.6.7 does not protect against CSRF in requests to update role capabilities, leading to arbitrary privilege escalation of any role.
0
Attacker Value
Unknown
CVE-2022-46906
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Reflected XSS.
0
Attacker Value
Unknown
CVE-2022-46905
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an unauthenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Reflected XSS.
0
Attacker Value
Unknown
CVE-2022-46904
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Self-XSS.
0
Attacker Value
Unknown
CVE-2022-46903
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Stored XSS.
0
Attacker Value
Unknown
CVE-2022-3393
Disclosure Date: October 25, 2022 (last updated February 24, 2025)
The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection
0
Attacker Value
Unknown
CVE-2021-25121
Disclosure Date: June 20, 2022 (last updated February 23, 2025)
The Rating by BestWebSoft WordPress plugin before 1.6 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating
0
Attacker Value
Unknown
CVE-2017-20055
Disclosure Date: June 16, 2022 (last updated February 23, 2025)
A vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component.
0