CVE-2024-35678 – WordPress Contact Form to DB by BestWebSoft plugin <= 1.7.2 - SQL Injection vulnerability
https://notcve.org/view.php?id=CVE-2024-35678
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2. Neutralización inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ("Inyección SQL") en BestWebSoft Contact Form to DB de BestWebSoft. Este problema afecta el Contact Form to DB de BestWebSoft: desde n/a hasta 1.7.2. The Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-36508 – WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.1 is vulnerable to SQL Injection
https://notcve.org/view.php?id=CVE-2023-36508
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.1. Neutralización Inadecuada de Elementos Especiales utilizados en una vulnerabilidad de comando SQL ('Inyección SQL') en BestWebSoft Contact Form to DB por BestWebSoft – complemento Messages Database para WordPress contact-form-to-db permite la Inyección SQL. Este problema afecta a Contact Form to DB por BestWebSoft - complemento Messages Database para WordPress: desde n/a hasta la versión 1.7.1. The Contact Form to DB by BestWebSoft plugin for WordPress is vulnerable to SQL Injection via the 's' parameter in versions up to, and including, 1.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-29096 – WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.0 is vulnerable to SQL Injection
https://notcve.org/view.php?id=CVE-2023-29096
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.0. Neutralización incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('Inyección SQL') en BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin for WordPress. Este problema afecta a Contact Form to DB by BestWebSoft – Messages Database Plugin for WordPress: desde n /a hasta 1.7.0. The Contact Form to DB by BestWebSoft plugin for WordPress is vulnerable to SQL Injection via the cntctfrmtdb_department parameter in versions up to, and including, 1.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers , with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2017-2171
https://notcve.org/view.php?id=CVE-2017-2171
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu. Una Vulnerabilidad de tipo cross-site-scripting en Captcha anterior a versión 4.3.0, Car Rental anterior a versión 1.0.5, Contact Form Multi anterior a versión 1.2.1, Contact Form anterior a versión 4.0.6, Contact Form to DB anterior a versión 1.5.7, Custom Admin Page anterior a versión 0.1.2, Custom Fields Search anterior a versión 1.3.2, Custom Search anterior a versión 1.36, Donate anterior a versión 2.1.1, Email Queue anterior a versión 1.1.2, Error Log Viewer anterior a versión 1.0.6, Facebook Button anterior a versión 2.54, Featured Posts anterior a versión 1.0.1, Gallery Categories anterior a versión 1.0.9, Gallery anterior a versión 4.5.0, Google +1 anterior a versión 1.3.4, Google AdSense anterior a versión 1.44, Google Analytics anterior a versión 1.7.1, Google Captcha (reCAPTCHA) anterior a versión 1.28, Google Maps anterior a versión 1.3.6, Google Shortlink anterior a versión 1.5.3, Google Sitemap anterior a versión 3.0.8, Htaccess anterior a versión 1.7.6, Job Board anterior a versión 1.1.3, Latest Posts anterior a versión 0.3, Limit Attempts anterior a versión 1.1.8, LinkedIn anterior a versión 1.0.5, Multilanguage anterior a versión 1.2.2, PDF & Print anterior a versión 1.9.4, Pagination anterior a versión 1.0.7, Pinterest anterior a versión 1.0.5, Popular Posts anteriores a versión 1.0.5, Portfolio anterior a la versión 2.4, Post to CSV anterior a versión 1.3.1, Profile Extra anterior a versión 1.0.7. PromoBar anterior a versión 1.1.1, Quotes and Tips anterior a versión 1.32, Re-attacher anterior a versión 1.0.9, Realty anterior a versión 1.1.0, Relevant - Related Posts anterior a versión 1.2.0, Sender anterior a versión 1.2.1, SMTP anterior a versión 1.1.0, Social Buttons Pack anterior a versión 1.1.1, Subscriber anterior a versión 1.3.5, Testimonials anteriores a versión 0.1.9, Timesheet anterior a versión 0.1.5, Twitter Button anterior a versión 2.55, User Role anterior a versión 1.5.6, Updater anterior a versión 1.35, Visitors Online anterior a versión 1.0.0, y Zendesk Help Center anterior a versión 1.0.5, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de la función para mostrar el menú BestWebSoft. • http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094 https://jvn.jp/en/jp/JVN24834813/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-91: XML Injection (aka Blind XPath Injection) •
CVE-2017-18492 – Contact Form to DB <= 1.5.6 - Multiple Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2017-18492
The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues. El complemento contact-form-to-db anterior de 1.5.7 para WordPress tiene múltiples problemas XSS. The Contact Form to DB plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.5.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. • https://wordpress.org/plugins/contact-form-to-db/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •