Page 5 of 23 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The contact-form-plugin plugin before 3.3.5 for WordPress has XSS. El plugin contact-form-plugin versiones anteriores a 3.3.5 para WordPress, presenta una vulnerabilidad de tipo XSS. The Contact Form By BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.34 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. • https://wordpress.org/plugins/contact-form-plugin/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The contact-form-plugin plugin before 3.52 for WordPress has XSS. El complemento contact-form-plugin antes de 3.52 para WordPress tiene XSS. The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.51 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. CVE-2013-10022 may be a duplicate of this issue. • https://wordpress.org/plugins/contact-form-plugin/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the preview form in Stephen Ostermiller Contact Form before 2.00.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that contain an apostrophe. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el formulario de pre visualización del Stephen Ostermiller Contact Form anterior al 2.00.02 permite a atacantes remotos la inyección de secuencias de comandos web o HTML de su elección a través de vectores sin especificar que contengan un apostrofe. • http://bugzilla.ostermiller.com/show_bug.cgi?id=151 http://ostermiller.org/contactform http://osvdb.org/36372 http://secunia.com/advisories/25812 http://www.attrition.org/pipermail/vim/2007-June/001669.html http://www.securityfocus.com/bid/24559 http://www.vupen.com/english/advisories/2007/2333 https://exchange.xforce.ibmcloud.com/vulnerabilities/34962 •