Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-20
Total 9170 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-20980 1 Ninjaforms 1 Ninja Forms 2019-08-26 5.0 MEDIUM 7.5 HIGH
The ninja-forms plugin before 3.2.15 for WordPress has parameter tampering.
CVE-2017-18574 1 Ninjaforms 1 Ninja Forms 2019-08-26 4.3 MEDIUM 6.1 MEDIUM
The ninja-forms plugin before 3.0.31 for WordPress has insufficient HTML escaping in the builder.
CVE-2018-20985 1 Payeezy 1 Wp Payeezy Pay 2019-08-26 7.5 HIGH 9.8 CRITICAL
The wp-payeezy-pay plugin before 2.98 for WordPress has local file inclusion in pay.php, donate.php, donate-rec, and pay-rec.
CVE-2009-5158 1 Sumo 1 Google Analyticator 2019-08-26 4.3 MEDIUM 6.1 MEDIUM
The google-analyticator plugin before 5.2.1 for WordPress has insufficient HTML sanitization for Google Analytics API text.
CVE-2017-18580 1 Getshortcodes 1 Shortcodes Ultimate 2019-08-23 7.5 HIGH 9.8 CRITICAL
The shortcodes-ultimate plugin before 5.0.1 for WordPress has remote code execution via a filter in a meta, post, or user shortcode.
CVE-2016-0785 1 Apache 1 Struts 2019-08-23 9.0 HIGH 8.8 HIGH
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
CVE-2016-10899 1 Fabrix 1 Total Security 2019-08-22 5.0 MEDIUM 5.3 MEDIUM
The total-security plugin before 3.4.1 for WordPress has a settings-change vulnerability.
CVE-2019-7959 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2019-08-21 10.0 HIGH 9.8 CRITICAL
Creative Cloud Desktop Application versions 4.6.1 and earlier have a using components with known vulnerabilities vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2017-18545 1 Invite Anyone Project 1 Invite Anyone 2019-08-21 5.0 MEDIUM 7.5 HIGH
The invite-anyone plugin before 1.3.16 for WordPress has incorrect escaping of untrusted Dashboard and front-end input.
CVE-2018-20973 1 Codeermeneer 1 Companion Auto Update 2019-08-21 7.5 HIGH 9.8 CRITICAL
The companion-auto-update plugin before 3.2.1 for WordPress has local file inclusion.
CVE-2013-7338 2 Apple, Python 2 Mac Os X, Python 2019-08-21 7.1 HIGH N/A
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
CVE-2019-0720 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2019-08-20 7.7 HIGH 8.4 HIGH
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'.
CVE-2019-0714 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2019-08-20 5.5 MEDIUM 6.2 MEDIUM
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0715, CVE-2019-0717, CVE-2019-0718, CVE-2019-0723.
CVE-2019-0715 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2019-08-20 5.5 MEDIUM 6.2 MEDIUM
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0714, CVE-2019-0717, CVE-2019-0718, CVE-2019-0723.
CVE-2019-0717 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-08-20 5.5 MEDIUM 6.2 MEDIUM
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0714, CVE-2019-0715, CVE-2019-0718, CVE-2019-0723.
CVE-2019-0723 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2019-08-20 5.5 MEDIUM 6.2 MEDIUM
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0714, CVE-2019-0715, CVE-2019-0717, CVE-2019-0718.
CVE-2019-0718 1 Microsoft 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more 2019-08-20 5.5 MEDIUM 6.2 MEDIUM
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0714, CVE-2019-0715, CVE-2019-0717, CVE-2019-0723.
CVE-2019-14771 1 Backdropcms 1 Backdrop Cms 2019-08-19 9.3 HIGH 9.8 CRITICAL
Backdrop CMS 1.12.x before 1.12.8 and 1.13.x before 1.13.3 allows the upload of entire-site configuration archives through the user interface or command line. It does not sufficiently check uploaded archives for invalid data, potentially allowing non-configuration scripts to be uploaded to the server. (This attack is mitigated by the attacker needing the "Synchronize, import, and export configuration" permission, a permission that only trusted administrators should be given. Other preventative measures in Backdrop CMS prevent the execution of PHP scripts, so another server-side scripting language must be accessible on the server to execute code.)
CVE-2019-0965 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-08-19 7.7 HIGH 8.4 HIGH
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.
CVE-2018-18354 3 Debian, Google, Redhat 5 Debian Linux, Chrome, Enterprise Linux Desktop and 2 more 2019-08-17 6.8 MEDIUM 8.8 HIGH
Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.