Quick Contact Form

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Freemius SDK 2.5.9 (1072 components affected)

    Fixed

    The Freemius SDK for WordPress is vulnerable to an attack known as Reflected Cross-Site Scripting. This attack is possible because of insufficient security measures in versions of the Freemius SDK up ...

    Read More
  • Input validation vulnerability in Quick Contact Form 8.0.3.1

    Fixed

    The Quick Contact Form plugin for WordPress has an issue that makes it vulnerable to unauthenticated attackers. This means that someone who is not an authorized user can gain access to private informa...

    Read More
  • Input validation vulnerability in Quick Contact Form 6.1

    Fixed

    The Quick Contact Form plugin for WordPress is vulnerable to a type of cyber attack called Cross-Site Scripting. This means that in versions of the plugin before 6.1, attackers can insert malicious w...

    Read More
  • Input validation vulnerability in Quick Contact Form 8.0.3.1

    Fixed

    The Quick Contact Form plugin for WordPress has a bug that makes it vulnerable to ""Stored Cross-Site Scripting"". This means that if someone with administrator-level permissions or higher uses the pl...

    Read More
  • Input validation vulnerability in Quick Contact Form 8.0.3.1

    Fixed

    The Quick Contact Form plugin for WordPress is not secure enough in versions up to 8.0.3.1. Attackers with limited access can take advantage of this vulnerability to insert harmful web scripts into pa...

    Read More
  • Access violation vulnerability in Freemius SDK (620 components affected)

    Fixed

    Freemius, a software development kit used by hundreds of WordPress plugin and theme developers, had a security vulnerability in its older versions (up to and including 2.4.2). This vulnerability could...

    Read More