Vulnerabilities (CVE)

Filtered by CWE-20
Total 10626 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-11140 1 Intel 8 Compute Card Cd1iv128mk, Compute Card Firmware, Compute Stick Firmware and 5 more 2019-08-27 4.6 MEDIUM 6.7 MEDIUM
Insufficient session validation in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2014-10384 1 Memphis Documents Library Project 1 Memphis Documents Library 2019-08-26 7.5 HIGH 9.8 CRITICAL
The memphis-documents-library plugin before 3.0 for WordPress has Local File Inclusion.
CVE-2014-10383 1 Memphis Documents Library Project 1 Memphis Documents Library 2019-08-26 7.5 HIGH 9.8 CRITICAL
The memphis-documents-library plugin before 3.0 for WordPress has Remote File Inclusion.
CVE-2019-15324 1 Ad Inserter Project 1 Ad Inserter 2019-08-26 6.5 MEDIUM 8.8 HIGH
The ad-inserter plugin before 2.4.22 for WordPress has remote code execution.
CVE-2018-20981 1 Ninjaforms 1 Ninja Forms 2019-08-26 6.4 MEDIUM 9.1 CRITICAL
The ninja-forms plugin before 3.3.9 for WordPress has insufficient restrictions on submission-data retrieval during Export Personal Data requests.
CVE-2018-20980 1 Ninjaforms 1 Ninja Forms 2019-08-26 5.0 MEDIUM 7.5 HIGH
The ninja-forms plugin before 3.2.15 for WordPress has parameter tampering.
CVE-2017-18574 1 Ninjaforms 1 Ninja Forms 2019-08-26 4.3 MEDIUM 6.1 MEDIUM
The ninja-forms plugin before 3.0.31 for WordPress has insufficient HTML escaping in the builder.
CVE-2018-20985 1 Payeezy 1 Wp Payeezy Pay 2019-08-26 7.5 HIGH 9.8 CRITICAL
The wp-payeezy-pay plugin before 2.98 for WordPress has local file inclusion in pay.php, donate.php, donate-rec, and pay-rec.
CVE-2009-5158 1 Sumo 1 Google Analyticator 2019-08-26 4.3 MEDIUM 6.1 MEDIUM
The google-analyticator plugin before 5.2.1 for WordPress has insufficient HTML sanitization for Google Analytics API text.
CVE-2017-18580 1 Getshortcodes 1 Shortcodes Ultimate 2019-08-23 7.5 HIGH 9.8 CRITICAL
The shortcodes-ultimate plugin before 5.0.1 for WordPress has remote code execution via a filter in a meta, post, or user shortcode.
CVE-2016-0785 1 Apache 1 Struts 2019-08-23 9.0 HIGH 8.8 HIGH
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
CVE-2016-10899 1 Fabrix 1 Total Security 2019-08-22 5.0 MEDIUM 5.3 MEDIUM
The total-security plugin before 3.4.1 for WordPress has a settings-change vulnerability.
CVE-2019-7959 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2019-08-21 10.0 HIGH 9.8 CRITICAL
Creative Cloud Desktop Application versions 4.6.1 and earlier have a using components with known vulnerabilities vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2017-18545 1 Invite Anyone Project 1 Invite Anyone 2019-08-21 5.0 MEDIUM 7.5 HIGH
The invite-anyone plugin before 1.3.16 for WordPress has incorrect escaping of untrusted Dashboard and front-end input.
CVE-2018-20973 1 Codeermeneer 1 Companion Auto Update 2019-08-21 7.5 HIGH 9.8 CRITICAL
The companion-auto-update plugin before 3.2.1 for WordPress has local file inclusion.
CVE-2013-7338 2 Apple, Python 2 Mac Os X, Python 2019-08-21 7.1 HIGH N/A
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
CVE-2019-14474 1 Eq-3 2 Ccu3, Ccu3 Firmware 2019-08-16 5.0 MEDIUM 7.5 HIGH
eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-2019-9583 or a valid guest/user/admin account can start this attack too.
CVE-2019-11716 1 Mozilla 1 Firefox 2019-08-15 7.5 HIGH 8.3 HIGH
Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.
CVE-2019-11714 1 Mozilla 1 Firefox 2019-08-15 7.5 HIGH 9.8 CRITICAL
Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 68.
CVE-2019-11708 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2019-08-15 10.0 HIGH 10.0 CRITICAL
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.