U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 234,440 matching records.
Displaying matches 113,041 through 113,060.
Vuln ID Summary CVSS Severity
CVE-2017-18553

The ad-buttons plugin before 2.3.2 for WordPress has XSS.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10909

The booking-calendar-contact-form plugin before 1.0.24 for WordPress has SQL injection.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 9.8 CRITICAL
V2.0: 7.5 HIGH
CVE-2016-10908

The booking-calendar-contact-form plugin before 1.0.24 for WordPress has XSS.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10903

The GoDaddy godaddy-email-marketing-sign-up-forms plugin before 1.1.3 for WordPress has CSRF.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2016-10902

The wp-customer-reviews plugin before 3.0.9 for WordPress has CSRF in the admin tools.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2016-10901

The wp-customer-reviews plugin before 3.0.9 for WordPress has XSS in the admin tools.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10900

The uji-countdown plugin before 2.0.7 for WordPress has XSS.

Published: August 21, 2019; 9:15:11 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2019-15109

The the-events-calendar plugin before 4.8.2 for WordPress has XSS via the tribe_paged URL parameter.

Published: August 21, 2019; 8:15:11 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18540

The weblibrarian plugin before 3.4.8.7 for WordPress has XSS via front-end short codes.

Published: August 21, 2019; 8:15:11 AM -0400
V3.1: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18539

The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes.

Published: August 21, 2019; 8:15:11 AM -0400
V3.1: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18538

The weblibrarian plugin before 3.4.8.5 for WordPress has XSS via front-end short codes.

Published: August 21, 2019; 8:15:11 AM -0400
V3.1: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18537

The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18536

The stop-user-enumeration plugin before 1.3.8 for WordPress has XSS.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2017-18534

The share-on-diaspora plugin before 0.7.2 for WordPress has reflected XSS in share URL parameters.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10899

The total-security plugin before 3.4.1 for WordPress has a settings-change vulnerability.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 5.3 MEDIUM
V2.0: 5.0 MEDIUM
CVE-2016-10898

The total-security plugin before 3.4.1 for WordPress has XSS.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10897

The sermon-browser plugin before 0.45.16 for WordPress has multiple XSS issues.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-10896

The seo-redirection plugin before 4.3 for WordPress has stored XSS.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2015-9321

The shortcode-factory plugin before 1.1.1 for WordPress has XSS via add_query_arg.

Published: August 21, 2019; 8:15:10 AM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2019-15296

An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow is later performed via getdword_n(&ld->start[words], ld->bytes_left).

Published: August 21, 2019; 3:15:10 AM -0400
V3.0: 7.8 HIGH
V2.0: 6.8 MEDIUM