Browse all 5 CVE security advisories affecting Query Solutions. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Query Solutions develops database query optimization tools for enterprise environments. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and access control flaws. The company has recorded five CVEs to date, with several critical RCE issues allowing attackers to execute arbitrary commands on affected systems. While no major public security incidents have been documented, the consistent pattern of vulnerabilities in input handling and authentication mechanisms suggests potential risks for organizations relying on their query optimization solutions without proper hardening and patch management.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-24278 | Redirection for Contact Form 7 < 2.3.4 - Unauthenticated Arbitrary Nonce Generation — Redirection for Contact Form 7CWE-863 | 7.5 | - | 2021-05-14 |
| CVE-2021-24279 | Redirection for Contact Form 7 < 2.3.4 - Authenticated Arbitrary Plugin Installation — Redirection for Contact Form 7CWE-863 | 6.5 | - | 2021-05-14 |
| CVE-2021-24280 | Redirection for Contact Form 7 < 2.3.4 - Authenticated PHP Object Injection — Redirection for Contact Form 7CWE-502 | 8.8 | - | 2021-05-14 |
| CVE-2021-24281 | Redirection for Contact Form 7 < 2.3.4 - Authenticated Arbitrary Post Deletion — Redirection for Contact Form 7CWE-863 | 6.5 | - | 2021-05-14 |
| CVE-2021-24282 | Redirection for Contact Form 7 < 2.3.4 - Unprotected AJAX Actions — Redirection for Contact Form 7CWE-863 | 6.3 | - | 2021-05-14 |
This page lists every published CVE security advisory associated with Query Solutions. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.