Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bestwebsoft twitter vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-125103
A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bw...
Bestwebsoft Twitter
NA
CVE-2012-10015
A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-site request forgery. It is...
Bestwebsoft Twitter
4.3
CVSSv2
CVE-2017-18505
The twitter-plugin plugin prior to 2.55 for WordPress has XSS.
Bestwebsoft Twitter Button
4.3
CVSSv2
CVE-2017-2171
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fie...
Bestwebsoft Quotes And Tips
Bestwebsoft Re-attacher
Bestwebsoft Realty
Bestwebsoft Relevant - Related Posts
Bestwebsoft Google Maps
Bestwebsoft Google Shortlink
Bestwebsoft Google Sitemap
Bestwebsoft Htaccess
Bestwebsoft Email Queue
Bestwebsoft Donate
Bestwebsoft Custom Search
Bestwebsoft Custom Fields Search
Bestwebsoft Pdf \\& Print
Bestwebsoft Pagination
Bestwebsoft Pinterest
Bestwebsoft Testimonials
Bestwebsoft Timesheet
Bestwebsoft Twitter Button
Bestwebsoft User Role
Bestwebsoft Error Log Viewer
Bestwebsoft Facebook Button
Bestwebsoft Featured Posts
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started