| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS. |
| The ultimate-member plugin before 1.3.18 for WordPress has XSS via text input. |
| The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS. |
| The simple-fields plugin before 1.4.11 for WordPress has XSS. |
| The liveforms plugin before 3.2.0 for WordPress has SQL injection. |
| The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues. |
| The events-manager plugin before 5.5.7.1 for WordPress has DOM XSS. |
| The events-manager plugin before 5.6 for WordPress has code injection. |
| The events-manager plugin before 5.6 for WordPress has XSS. |
| The download-monitor plugin before 1.7.1 for WordPress has XSS related to add_query_arg. |
| The contact-form-plugin plugin before 3.96 for WordPress has XSS. |
| The all-in-one-wp-security-and-firewall plugin before 3.9.5 for WordPress has XSS in add_query_arg and remove_query_arg function instances. |
| The all-in-one-wp-security-and-firewall plugin before 3.9.8 for WordPress has XSS in the unlock request feature. |
| 6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter). |
| cPanel before 11.52.0.13 does not prevent arbitrary file-read operations via get_information_for_applications (CPANEL-1221). |
| In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. |
| In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23. |
| The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentials |
| Directory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field ("kid") of the IdP's HTTP response message ("WLS-Response") can be manipulated by an attacker. The "kid" field is not signed like the rest of the message, and manipulation is therefore trivial. The "kid" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location. |
| Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS. |