Documentation: Home / Quick Contact Form
This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The Freemius SDK for WordPress is vulnerable to an attack known as Reflected Cross-Site Scripting. This attack is possible because of insufficient security measures in versions of the Freemius SDK up ...
Read MoreThe Quick Contact Form plugin for WordPress has an issue that makes it vulnerable to unauthenticated attackers. This means that someone who is not an authorized user can gain access to private informa...
Read MoreThe Quick Contact Form plugin for WordPress is vulnerable to a type of cyber attack called Cross-Site Scripting. This means that in versions of the plugin before 6.1, attackers can insert malicious w...
Read MoreThe Quick Contact Form plugin for WordPress has a bug that makes it vulnerable to ""Stored Cross-Site Scripting"". This means that if someone with administrator-level permissions or higher uses the pl...
Read MoreThe Quick Contact Form plugin for WordPress is not secure enough in versions up to 8.0.3.1. Attackers with limited access can take advantage of this vulnerability to insert harmful web scripts into pa...
Read MoreFreemius, a software development kit used by hundreds of WordPress plugin and theme developers, had a security vulnerability in its older versions (up to and including 2.4.2). This vulnerability could...
Read More© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)