Browse all 4 CVE security advisories affecting zestardtechnologies. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Zestard Technologies develops web and mobile applications primarily for business process automation and client management solutions. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been documented, the four CVEs associated with their products highlight recurring security gaps in authentication mechanisms and data handling. Their security posture appears to focus on functional requirements rather than robust defense-in-depth measures, leaving their applications susceptible to common web exploitation techniques.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-1778 | Admin side data storage for Contact Form 7 <= 1.1.1 - Missing Authorization to Unauthenticated Bookmark Status Alteration — Admin side data storage for Contact Form 7CWE-862 | 4.3 | Medium | 2024-02-23 |
| CVE-2024-1776 | Admin side data storage for Contact Form 7 <= 1.1.1 - Authenticated (Admin+) SQL Injection — Admin side data storage for Contact Form 7CWE-89 | 7.2 | High | 2024-02-23 |
| CVE-2024-1777 | Admin side data storage for Contact Form 7 <= 1.1.1 - Cross-Site Request Forgery — Admin side data storage for Contact Form 7CWE-352 | 4.3 | Medium | 2024-02-23 |
| CVE-2024-1779 | Admin side data storage for Contact Form 7 plugin <= 1.1.1 - Missing Authorization to Unauthenticated Read Status Update — Admin side data storage for Contact Form 7CWE-862 | 5.3 | Medium | 2024-02-23 |
This page lists every published CVE security advisory associated with zestardtechnologies. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.