Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Emoncms
(Openenergymonitor)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-21 | CVE-2021-26716 | Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter. | Emoncms | 6.1 | ||
2017-02-12 | CVE-2017-5964 | An issue was discovered in Emoncms through 9.8.0. The vulnerability exists due to insufficient filtration of user-supplied data in multiple HTTP GET parameters passed to the "emoncms-master/Modules/vis/visualisations/compare.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | Emoncms | N/A | ||
2019-07-15 | CVE-2019-1010008 | OpenEnergyMonitor Project Emoncms 9.8.8 is affected by: Cross Site Scripting (XSS). The impact is: Theoretically low, but might potentially enable persistent XSS (user could embed mal. code). The component is: Javascript code execution in "Name", "Location", "Bio" and "Starting Page" fields in the "My Account" page. File: Lib/listjs/list.js, line 67. The attack vector is: unknown, victim must open profile page if persistent was possible. | Emoncms | 5.4 |