Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

embedpress

Source -

ADPNVD

CNA CVEs -

0

ADP CVEs -

638

CISA CVEs -

0

NVD CVEs -

26
Related CVEsRelated VendorsRelated AssignersReports
661Vulnerabilities found

CVE-2024-11203
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.09% / 25.77%
||
7 Day CHG~0.00%
Published-28 Nov, 2024 | 08:47
Updated-11 Apr, 2025 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EmbedPress – Embed PDF, 3D Flipbook, Social Feeds, Google Docs, Vimeo, Wistia, YouTube Videos, Audios, Google Maps in Gutenberg Block & Elementor <= 4.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'provider_name'

The EmbedPress – Embed PDF, 3D Flipbook, Social Feeds, Google Docs, Vimeo, Wistia, YouTube Videos, Audios, Google Maps in Gutenberg Block & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘provider_name parameter in all versions up to, and including, 4.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-WPDeveloper
Product-embedpressEmbedPress – Embed PDF, PDF 3D FlipBook, Instagram Social Feeds, Google Docs, Vimeo, Wistia, YouTube Videos, Maps & Upload PDF Documents
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-38707
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.3||MEDIUM
EPSS-0.17% / 38.26%
||
7 Day CHG~0.00%
Published-01 Nov, 2024 | 14:18
Updated-24 Mar, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress EmbedPress plugin <= 4.0.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in WPDeveloper EmbedPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EmbedPress: from n/a through 4.0.4.

Action-Not Available
Vendor-WPDeveloper
Product-embedpressEmbedPress
CWE ID-CWE-862
Missing Authorization
CVE-2024-50461
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.78%
||
7 Day CHG~0.00%
Published-28 Oct, 2024 | 17:48
Updated-13 Nov, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress EmbedPress plugin <= 4.0.14 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper EmbedPress allows Stored XSS.This issue affects EmbedPress: from n/a through 4.0.14.

Action-Not Available
Vendor-WPDeveloper
Product-embedpressEmbedPress
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23362
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.13% / 32.08%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-03 Oct, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Trusted Execution Environment

Cryptographic issue while parsing RSA keys in COBR format.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6426qdu1010_firmwareqca4004qca6698aq_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx55smart_audio_400_platform_firmwarear8031snapdragon_8cx_compute_platform_\(sc8180x-ab\)qcs4290_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_845_mobile_platform_firmwaresd670_firmwarewsa8845qfw7114robotics_rb5_platform_firmwaresd675_firmwaresrv1h_firmwarefastconnect_6200_firmwaresd670snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qca8081wsa8830_firmwarewsa8840sxr1230psa6145p_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_platformsnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareqca9984qam8295psnapdragon_x55_5g_modem-rf_systemqcn6274_firmwaresnapdragon_4_gen_1_mobile_platformsd_675_firmwaresa8540p_firmwaresnapdragon_835_mobile_pc_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)qcs8550_firmwareqca6574aqdu10109205_lte_modem_firmwareqam8295p_firmwaresd888_firmwaresc8380xp_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqru1062_firmwaresnapdragon_x65_5g_modem-rf_systemsa8775pqcn9012sa8155_firmwareqca6564au_firmwareqcn9012_firmwareqcn9024snapdragon_865_5g_mobile_platformsd888qca6430snapdragon_8\+_gen_2_mobile_platformaqt1000sm7250p_firmwaresmart_audio_400_platformsnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sa7255psd_8cxssg2115p_firmwaresnapdragon_675_mobile_platformsnapdragon_7c\+_gen_3_computeqdu1210qrb5165mqrb5165m_firmwaresd855_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_888_5g_mobile_platformqrb5165nsnapdragon_8_gen_3_mobile_platformsd_675snapdragon_wear_1300_platformqcm2290sxr2130snapdragon_ar2_gen_1_platform_firmwaresdx61_firmwareqca6574ausxr2130_firmwaresm7315sg8275p_firmwareqam8620psnapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresa8155p_firmwaressg2115psnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sa7255p_firmwaresxr2230pqca6431snapdragon_865_5g_mobile_platform_firmwarefastconnect_7800sd675sm8550pqca6320_firmwaresa7775p_firmwaresd460sa8255psnapdragon_4_gen_1_mobile_platform_firmwareqca6574qcn7606_firmwareqca6436qcs5430qca6574au_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_8_gen_2_mobile_platformwcn3990qcn6274snapdragon_x65_5g_modem-rf_system_firmwareqca6584au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewcn6755fastconnect_6800fastconnect_6900qca6426_firmwarevision_intelligence_300_platformwcd9335_firmwaresa8295psa9000p_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8832qam8775pcsra6640_firmwareqdu1110qdx1011_firmwarewcd9341_firmwaresa8620p_firmwaressg2125p_firmwaresd662_firmwaresd865_5g_firmwaresdx61snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platformsd460_firmwarefastconnect_6800_firmwareqdu1000_firmwareqca6678aq_firmwarewcn3910qsm8350_firmwaresdx55_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_8\+_gen_1_mobile_platform_firmwarerobotics_rb5_platformfastconnect_6700snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)wsa8832_firmwareqfw7114_firmwaresa8530p_firmwaresd855snapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewcn3950qcc710wsa8835_firmwareqca6431_firmwaresa6145psa8255p_firmwarewsa8830qca6421_firmwaresm4635_firmwareqca6420qca6564a_firmwaresrv1m_firmwaresa6155pqcm5430_firmwarewcn3950_firmwarewcd9380snapdragon_x35_5g_modem-rf_systemqcm6490_firmwaresnapdragon_780g_5g_mobile_platform_firmwarecsra6620sc8380xpqam8775p_firmwaresd835wcn3980qcs6490_firmwaresd_8_gen1_5g_firmwareqam8620p_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_x62_5g_modem-rf_systemwcd9378qca6335_firmwareqca6391_firmwarewcd9340_firmwaresnapdragon_778g_5g_mobile_platformwcn3988_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_665_mobile_platformwsa8810snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)sxr2250p_firmwaresnapdragon_695_5g_mobile_platform_firmwarevideo_collaboration_vc3_platformwsa8845h_firmwarewcn3910_firmwareqcm8550aqt1000_firmwareqamsrv1hsnapdragon_8\+_gen_1_mobile_platformqca8337sa8770p_firmwareqca6574a_firmwareqca6696_firmwaresm6370qcm4290wcd9380_firmwaresnapdragon_x50_5g_modem-rf_systemqep8111_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresa8295p_firmwarear8035_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)ar8031_firmwareqca6595au_firmwareflight_rb5_5g_platform_firmwareqca6797aqsnapdragon_460_mobile_platformqca6174asxr2230p_firmwareqcm4490qcn7606sm4125_firmwareqca6698aqsnapdragon_x35_5g_modem-rf_system_firmwarewcd9306_firmwareqamsrv1mqcs8250qrb5165n_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_855_mobile_platform_firmwaresa8650p_firmwaresnapdragon_x24_lte_modem_firmwaresrv1lsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x24_lte_modemsa6155_firmwarewcd9378_firmwareqca8081_firmwareqcs4290snapdragon_665_mobile_platform_firmwareqcc710_firmwarewcd9335qca6584auwsa8845hwsa8840_firmwarefastconnect_6200snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwareqcn9024_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcm4490_firmwareqca6421qru1032wsa8815_firmwaresm7315_firmwareqca6595snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn6740_firmwareqdx1010_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)wcd9390snapdragon_8\+_gen_2_mobile_platform_firmwarecsra6620_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_850_mobile_compute_platformwsa8835qru1052qcs2290_firmwarevision_intelligence_300_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3988wcd9390_firmwaresnapdragon_675_mobile_platform_firmwaresm8550p_firmwareqam8255p_firmwaresdx57msm7325p_firmwareqca6678aqvision_intelligence_400_platform_firmwaresa8155wcd9375sm4635srv1l_firmwareqcs4490_firmwaresm8635qam8650p_firmware9205_lte_modemrobotics_rb3_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6224sa8775p_firmwareqamsrv1m_firmwarewcd9385_firmwarefastconnect_6700_firmwarevideo_collaboration_vc5_platformqcs7230snapdragon_4_gen_2_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarear8035qcm2290_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)snapdragon_8_gen_1_mobile_platformqdx1011snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarevision_intelligence_400_platformsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresm7250pwcd9395_firmwareqru1032_firmwareqca6320wcd9306sa8150p_firmwaresnapdragon_480_5g_mobile_platformsa8650psm6370_firmwareqca4004_firmwaressg2125psnapdragon_845_mobile_platformqca6564aqcs8250_firmwareqca6310_firmwareqcs7230_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x70_modem-rf_system_firmwarewcn6740sa6155p_firmwareqca6310qcm5430qep8111sdx57m_firmwareqcn6024_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)talynplusqca6574_firmwareqamsrv1h_firmwareqcm8550_firmwareqam8650pqca6420_firmwaresnapdragon_ar2_gen_1_platformqdu1210_firmwareqfw7124_firmwareflight_rb5_5g_platformwcn3999qca6696sa8540psdx71msd_8cx_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresd835_firmwareqsm8350sa8770pqca6595_firmwarewcd9326_firmwaresnapdragon_460_mobile_platform_firmwareqcm6490wsa8810_firmwareqcs6490snapdragon_4_gen_2_mobile_platform_firmwarewcd9370wsa8845_firmwaresd662snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_855_mobile_platformwcn6755_firmwareqca6430_firmwaresdx71m_firmwaresd_8_gen1_5gqca9377qdx1010sa6155snapdragon_x70_modem-rf_systemsnapdragon_x75_5g_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwareqcs5430_firmwareqcn6024snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarecsra6640sa8155psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqru1062snapdragon_x62_5g_modem-rf_system_firmwareqdu1000wcn3990_firmwaresxr2250pqca6595ausa8620psxr1230p_firmwareqcm4290_firmwareqca9377_firmwaresnapdragon_670_mobile_platformqdu1110_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8c_compute_platform_\(sc8180xp-ad\)sa9000pwcn3980_firmwarevideo_collaboration_vc5_platform_firmwareqcs4490qru1052_firmwareqca6335snapdragon_8cx_compute_platform_\(sc8180xp-ac\)wsa8815qca6391wcd9370_firmwareqam8255pqfw7124qca6564ausnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcn9011_firmwareqcs8550wcd9341sd865_5gsa8150pqcs2290wcd9340wcd9395snapdragon_xr2_5g_platformsm7325psa8530pqcn6224_firmwarerobotics_rb3_platformqca6797aq_firmwaresm8635_firmwaresnapdragon_662_mobile_platformsnapdragon_wear_1300_platform_firmwarewcd9375_firmwareqcn9011snapdragon_x50_5g_modem-rf_system_firmwarewcn3999_firmwaresrv1hqca6174a_firmwaretalynplus_firmwarewcd9385sa7775pfastconnect_6900_firmwaresg8275psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm4125snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6436_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarevideo_collaboration_vc3_platform_firmwareqca8337_firmwaresrv1mwcd9326snapdragon_680_4g_mobile_platformqca9984_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_662_mobile_platform_firmwaretalynplus_firmwaresxr2230p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwarewcn3950_firmwaresrv1l_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwarewcn6755_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqep8111_firmwareqrb5165n_firmwarewcn3990_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresd_8cx_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwareqamsrv1h_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwaresdx71m_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwareqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3999_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwaresa8775p_firmwaresnapdragon_x70_modem-rf_system_firmwareqrb5165m_firmwarewsa8840_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmwaresc8380xp_firmwaresd662_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwareqru1062_firmwaresa6145p_firmwarewcd9306_firmwaresa7775p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqdu1000_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresnapdragon_wear_1300_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwareqru1052_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwaresa8295p_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresm4635_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9378_firmwareqcs7230_firmwareqdu1010_firmwaresnapdragon_670_mobile_platform_firmwaresa8530p_firmwaresd670_firmwaresxr1230p_firmwareqdu1110_firmwaresa8540p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwaresm8635_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwareqfw7114_firmwaresm6370_firmwarewcd9335_firmwareqca6335_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqcn6274_firmwareqcs4490_firmwarear8031_firmwareqcm6490_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwaresa8155p_firmwareqdx1011_firmwareqca6564a_firmwareqcn9024_firmwaresa7255p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqdx1010_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresdx61_firmwaressg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23359
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.14% / 34.15%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-03 Oct, 2025 | 18:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Multi Mode Call Processor

Information disclosure while decoding Tracking Area Update Accept or Attach Accept message received from network.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6426qca4004qca6698aq_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx55wcn3615apq8017_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_xr2_5g_platform_firmwarewcn3620wsa8845qfw7114fastconnect_6200_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)qca8081snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)wsa8830_firmwarewsa8840snapdragon_auto_5g_modem-rf_gen_2snapdragon_auto_5g_modem-rfsnapdragon_x55_5g_modem-rf_systemqcn6274_firmwaresnapdragon_4_gen_1_mobile_platformqcs8550_firmwareqca6574a9205_lte_modem_firmwaresd888_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemwcn3620_firmwaresdm429w_firmwareqca6564au_firmwareqcn9024snapdragon_865_5g_mobile_platformsd888qca6430snapdragon_8\+_gen_2_mobile_platformaqt1000sm7250p_firmwaremsm8108snapdragon_210_processor_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_wear_4100\+_platformsnapdragon_212_mobile_platformqts110snapdragon_7c\+_gen_3_computesd855_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_888_5g_mobile_platformsnapdragon_8_gen_3_mobile_platformsnapdragon_wear_1300_platformsnapdragon_1200_wearable_platform_firmwaremsm8108_firmwaresxr2130sdx61_firmwareqca6574ausxr2130_firmwaresmart_audio_200_platform_firmwaresm7315sg8275p_firmwarewcn3610snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)qca6431fastconnect_7800snapdragon_865_5g_mobile_platform_firmwarewcn3680bsm8550psnapdragon_212_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca6436msm8209_firmwareqcs5430qca6574au_firmwaresnapdragon_8_gen_2_mobile_platformqcn6274snapdragon_x65_5g_modem-rf_system_firmwareqca6584au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarefastconnect_6800wcn6755fastconnect_6900qca6426_firmwaremdm9205ssnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8832msm8608wcd9341_firmwareqts110_firmware9206_lte_modem_firmwaresd865_5g_firmwaresdx61snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmware205_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platform9206_lte_modemfastconnect_6800_firmwaresdx55_firmwareapq8017snapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_429_mobile_platformsnapdragon_8\+_gen_1_mobile_platform_firmwarefastconnect_6700snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)wsa8832_firmwaresnapdragon_auto_4g_modem_firmwareqfw7114_firmwaresd855snapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewcn3950qcc710wsa8835_firmwareqca6431_firmwarewsa8830qca6421_firmwareqca6420qcm5430_firmwaresnapdragon_x35_5g_modem-rf_systemmsm8608_firmwarewcd9380wcn3950_firmwareqcm6490_firmwaresnapdragon_780g_5g_mobile_platform_firmwarewcn3980205_mobile_platformqcs6490_firmwaresnapdragon_x62_5g_modem-rf_systemqca6391_firmwaresnapdragon_778g_5g_mobile_platformwcd9340_firmwarewcn3988_firmwaresnapdragon_480_5g_mobile_platform_firmwarewsa8810snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)csrb31024snapdragon_425_mobile_platformsnapdragon_695_5g_mobile_platform_firmwarevideo_collaboration_vc3_platformwsa8845h_firmwarewcn3615_firmwareqcm8550aqt1000_firmwareqca9367snapdragon_8\+_gen_1_mobile_platformqca8337qca6574a_firmwareqca6696_firmwaresnapdragon_1200_wearable_platformwcd9380_firmwaresnapdragon_x50_5g_modem-rf_systemqep8111_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmware315_5g_iot_modem_firmwarear8035_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)snapdragon_750g_5g_mobile_platformwcd9360_firmwareqca6595au_firmwareqca6174awcd9306_firmwareqcm4490snapdragon_x35_5g_modem-rf_system_firmwareqca6698aqsnapdragon_695_5g_mobile_platformsnapdragon_855_mobile_platform_firmwaresnapdragon_208_processorsnapdragon_x24_lte_modem_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x24_lte_modemqca8081_firmwareqcc710_firmwareqca6584auwsa8845hsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwarefastconnect_6200snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwarewsa8840_firmwareqcn9024_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcm4490_firmwareqca6421wsa8815_firmware315_5g_iot_modemsm7315_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn6740_firmwaresc8180x\+sdx55snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_429_mobile_platform_firmwarewcd9390mdm9205s_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwarewsa8835snapdragon_8_gen_3_mobile_platform_firmwarewcn3988wcd9390_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm7325p_firmwaresdx57mwcd9375qcs4490_firmwaresm86359205_lte_modemsnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6224wcd9385_firmwarewcd9360fastconnect_6700_firmwaresnapdragon_430_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarear8035snapdragon_8c_compute_platform_\(sc8180x-ad\)snapdragon_690_5g_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcn3660bsm7250pwcd9395_firmwarewcd9306snapdragon_480_5g_mobile_platformqca4004_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660b_firmwaresnapdragon_x70_modem-rf_system_firmwarewcn6740qcm5430qep8111sdx57m_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)qcn6024_firmwareqcm8550_firmwareqca6420_firmwareqfw7124_firmwaresnapdragon_auto_4g_modemsnapdragon_208_processor_firmwareqca6696sdx71msnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_430_mobile_platform_firmwaresc8180x\+sdx55_firmwaresnapdragon_425_mobile_platform_firmwarewcd9326_firmwareqcm6490wsa8810_firmwareqcs6490wcd9370wsa8845_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresmart_audio_200_platformwcn6755_firmwaresnapdragon_855_mobile_platformsdx71m_firmwareapq8037_firmwareqca6430_firmwareqca9377snapdragon_x70_modem-rf_systemsnapdragon_x75_5g_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwareqcs5430_firmwareqcn6024snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresnapdragon_210_processorsnapdragon_x62_5g_modem-rf_system_firmwareqca6595ausdm429wqca9377_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)wcn3980_firmwareqcs4490snapdragon_8cx_compute_platform_\(sc8180xp-ac\)wsa8815qca6391wcd9370_firmwareqfw7124qca6564ausnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs8550sd865_5gqca9367_firmwarewcd9341wcd9340snapdragon_439_mobile_platform_firmwarewcn3610_firmwaresnapdragon_xr2_5g_platformwcd9395sm7325pqcn6224_firmwaresm8635_firmwarecsrb31024_firmwaresnapdragon_wear_1300_platform_firmwarewcd9375_firmwareapq8037wcn3680b_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6174a_firmwaresg8275pwcd9385snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarefastconnect_6900_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaremsm8209qca6436_firmwaresnapdragon_439_mobile_platformsnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarevideo_collaboration_vc3_platform_firmwareqca8337_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9326Snapdragonqca9377_firmware315_5g_iot_modem_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwarewcd9360_firmwareqcn6224_firmwarewcn3950_firmwaremdm9205s_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcn6755_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_auto_4g_modem_firmwareqcm5430_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqep8111_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwarewcn3615_firmwaresnapdragon_1200_wearable_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwaresdx71m_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwareqca8081_firmwarewcd9375_firmwarewcn3680b_firmwaresm7250p_firmwarewsa8845h_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_x70_modem-rf_system_firmwarewsa8840_firmwareqca4004_firmwareqcs8550_firmwarewcn3988_firmwarewcd9306_firmwarefastconnect_6700_firmwareapq8017_firmwarewsa8810_firmwarewcd9395_firmwareqca6698aq_firmwaremsm8209_firmwareqca6174a_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_wear_1300_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_210_processor_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwarear8035_firmwaresdm429w_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_430_mobile_platform_firmwareqca6430_firmwareqfw7114_firmwarewcd9340_firmwaresm7325p_firmwaresdx57m_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqcn6274_firmwareqcs4490_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmware9206_lte_modem_firmwaresmart_audio_200_platform_firmwareqcn9024_firmwarewcd9341_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs5430_firmwareqca6391_firmwaremsm8608_firmwaresm8550p_firmwarewcd9370_firmwaresd888_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwareapq8037_firmwareqfw7124_firmwaresdx61_firmwareqts110_firmware
CWE ID-CWE-126
Buffer Over-read
CVE-2024-23358
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.25%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-03 Oct, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Multi Mode Call Processor

Transient DOS when registration accept OTA is received with incorrect ciphering key data IE in Modem.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6698aq_firmwarewcn3615ar8035_firmwareapq8017_firmwaremsm8209_firmwarewcn3620qfw7114wsa8845qcn6274qca6584au_firmwarewcn6755qca6698aqqca8081qfw7124_firmwarewsa8830_firmwarewsa8840snapdragon_208_processor_firmwaresnapdragon_auto_5g_modem-rf_gen_2wsa8832snapdragon_430_mobile_platform_firmwaresnapdragon_208_processormsm8608snapdragon_425_mobile_platform_firmwareqcn6274_firmwarewcd9326_firmwareqca8081_firmwarewcd9326qcc710_firmwareqca6584auwsa8810_firmwarewsa8845hwsa8840_firmwarewcd9370wsa8845_firmwaresmart_audio_200_platformsnapdragon_x72_5g_modem-rf_system_firmwarewcn6755_firmwareapq8037_firmware205_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3620_firmwaresnapdragon_x75_5g_modem-rf_systemwsa8815_firmwareapq8017snapdragon_429_mobile_platformsdm429w_firmwarewsa8832_firmwareqfw7114_firmwaresnapdragon_210_processorsnapdragon_429_mobile_platform_firmwarewcd9390sdm429wqcc710msm8108wsa8835wsa8835_firmwarewsa8830snapdragon_210_processor_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresnapdragon_wear_4100\+_platformsnapdragon_212_mobile_platformmsm8608_firmwarewcn3980_firmwarewcd9375fastconnect_7800_firmwaresm8635wcn3980205_mobile_platformwsa8815wcd9370_firmwaresnapdragon_8_gen_3_mobile_platformqfw7124snapdragon_x72_5g_modem-rf_systemqcn6224wcd9340_firmwaresnapdragon_439_mobile_platform_firmwarewcd9340wcd9395wcn3610_firmwaresnapdragon_430_mobile_platformmsm8108_firmwareqcn6224_firmwaresm8635_firmwarewsa8810ar8035wcd9375_firmwareapq8037wcn3680b_firmwaresnapdragon_425_mobile_platformsmart_audio_200_platform_firmwarewcn3610wcn3660bwcd9395_firmwarewcn3615_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca8337msm8209snapdragon_439_mobile_platformfastconnect_7800wcn3660b_firmwarewcn3680bqca8337_firmwaresnapdragon_wear_4100\+_platform_firmwarewsa8845h_firmwaresnapdragon_212_mobile_platform_firmwareSnapdragonqca8337_firmwareqcn6274_firmwarewsa8832_firmwarewsa8840_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcn6224_firmwaresdm429w_firmwaresmart_audio_200_platform_firmwareapq8017_firmwarewsa8810_firmwarefastconnect_7800_firmwarewcn6755_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarewcd9395_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_430_mobile_platform_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwareqfw7114_firmwaremsm8108_firmwarewcd9326_firmwarewcn3615_firmwaremsm8608_firmwarewcd9370_firmwaresnapdragon_210_processor_firmwarewcd9340_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwareapq8037_firmwarewcn3620_firmwaresnapdragon_439_mobile_platform_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarewcn3680b_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwarewcd9375_firmwareqca8081_firmwarewcn3980_firmwareqfw7124_firmwarewsa8845h_firmwarewcn3610_firmwarear8035_firmware
CWE ID-CWE-126
Buffer Over-read
CVE-2024-7692
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.32% / 54.57%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 06:00
Updated-04 Oct, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flaming Forms <= 1.0.1 - Reflected XSS

The Flaming Forms WordPress plugin through 1.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

Action-Not Available
Vendor-projectcarusoUnknownprojectcaruso
Product-flaming_formsFlaming Formsflaming_forms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-7691
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-5.4||MEDIUM
EPSS-0.54% / 67.04%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 06:00
Updated-04 Oct, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flaming Forms <= 1.0.1 - Unauthenticated Stored XSS

The Flaming Forms WordPress plugin through 1.0.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks against administrators.

Action-Not Available
Vendor-projectcarusoUnknownprojectcaruso
Product-flaming_formsFlaming Formsflaming_forms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-7690
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-5.4||MEDIUM
EPSS-0.07% / 22.49%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 06:00
Updated-07 Oct, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DN Popup <= 1.2.2 - Settings Update via CSRF

The DN Popup WordPress plugin through 1.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

Action-Not Available
Vendor-digireturnUnknowndigireturn
Product-dn_popupDN Popupdn-popup
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-7354
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-1.18% / 78.37%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 06:00
Updated-04 Oct, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ninja Forms 3.8.6-3.8.10 - Reflected XSS

The Ninja Forms WordPress plugin before 3.8.11 does not escape an URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Action-Not Available
Vendor-UnknownSaturday Drive, INC
Product-ninja_formsNinja Formsninja_forms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-43776
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-8.7||HIGH
EPSS-0.46% / 63.44%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:04
Updated-04 Sep, 2024 | 12:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in mock exam function of Easytest Online Test Platform ver.24E01 and earlier allow remote authenticated users to execute arbitrary SQL commands via the qlevel parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-43775
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-8.7||HIGH
EPSS-0.46% / 63.44%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:03
Updated-04 Sep, 2024 | 12:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in search course titles function of Easytest Online Test Platform ver.24E01 and earlier allow remote authenticated users to execute arbitrary SQL commands via the search parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-43774
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-8.7||HIGH
EPSS-0.46% / 63.44%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:02
Updated-04 Sep, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in download personal learning course function of Easytest Online Test Platform ver.24E01 and earlier allow remote authenticated users to execute arbitrary SQL commands via the uid parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-43773
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-9.3||CRITICAL
EPSS-0.46% / 63.43%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:01
Updated-04 Sep, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in download class learning course function of Easytest Online Test Platform ver.24E01 and earlier allow remote attackers to execute arbitrary SQL commands via the cstr parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-43772
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-9.3||CRITICAL
EPSS-0.46% / 63.43%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:01
Updated-04 Sep, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in download student learning course function of Easytest Online Test Platform ver.24E01 and earlier allow remote attackers to execute arbitrary SQL commands via the uid parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-7871
Assigner-ZUSO Advanced Research Team (ZUSO ART)
ShareView Details
Assigner-ZUSO Advanced Research Team (ZUSO ART)
CVSS Score-8.7||HIGH
EPSS-0.46% / 63.44%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 04:00
Updated-23 Jan, 2026 | 19:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Huachu Easytest Online Learning Test Platform - SQL Injection

SQL Injection in online dictionary function of Easytest Online Test Platform ver.24E01 and earlier allow remote authenticated users to execute arbitrary SQL commands via the word parameter.

Action-Not Available
Vendor-easytestHuachu Digital Technology Ltd.huaju
Product-easytest_online_test_platformEasytest Online Test Platformeasytest_online_learning_test_platform
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-41160
Assigner-OpenHarmony
ShareView Details
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.98%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 03:25
Updated-09 Sep, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos-A has an use after free vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmonyopenharmony
CWE ID-CWE-416
Use After Free
CVE-2024-41157
Assigner-OpenHarmony
ShareView Details
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.26%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 03:25
Updated-04 Sep, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos-A has an use after free vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmonyopenharmony
CWE ID-CWE-416
Use After Free
CVE-2024-39816
Assigner-OpenHarmony
ShareView Details
Assigner-OpenHarmony
CVSS Score-8.4||HIGH
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 03:25
Updated-04 Sep, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arkcompiler Ets Runtime has an out-of-bounds write vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmonyopenharmony
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-38386
Assigner-OpenHarmony
ShareView Details
Assigner-OpenHarmony
CVSS Score-8.4||HIGH
EPSS-0.09% / 25.70%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 03:25
Updated-04 Sep, 2024 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arkcompiler Ets Runtime has an out-of-bounds write vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmonyopenharmony
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20089
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-2.29% / 84.39%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 02:07
Updated-05 Sep, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.

Action-Not Available
Vendor-rdkcentralGoogle LLCMediaTek Inc.The Linux Foundation
Product-mt6980mt6990mt6985mt6835androidmt6886mt8792mt6989mt8775yoctomt6897mt8796mt6878rdk-bmt8678MT6835, MT6878, MT6886, MT6897, MT6980, MT6985, MT6989, MT6990, MT8678, MT8775, MT8792, MT8796mt6980mt6990mt6985mt6835androidmt6886mt8792mt6989mt8775mt8796mt6897yoctomt6878mt8678
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2024-20087
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.60%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 02:07
Updated-05 Sep, 2024 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932916; Issue ID: MSV-1550.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8667androidmt8385mt8768mt8789mt8788mt8766mt6768mt6779mt8666mt6785mt8781mt6765MT6765, MT6768, MT6779, MT6785, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789mt8667mt8385mt8768mt8789androidmt8788mt8766mt6768mt6779mt8666mt6785mt8781mt6765
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20086
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.60%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 02:07
Updated-05 Sep, 2024 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932916; Issue ID: MSV-1551.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8667androidmt8385mt8768mt8789mt8788mt8766mt6768mt6779mt8666mt6785mt8781mt6765MT6765, MT6768, MT6779, MT6785, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789mt8667mt8385mt8768mt8789androidmt8788mt8766mt6768mt6779mt8666mt6785mt8781mt6765
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45527
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.12% / 31.97%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 00:00
Updated-30 Apr, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

REDCap 14.7.0 allows HTML injection via the project title of a New Project action. This can lead to resultant logout CSRF via index.php?logout=1, and can also be used to insert a link to an external phishing website.

Action-Not Available
Vendor-vanderbiltn/aredcap
Product-redcapn/aredcap
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-45528
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.15% / 36.35%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 00:00
Updated-31 Mar, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CodeAstro MembershipM-PHP (aka Membership Management System in PHP) 1.0 allows add_members.php fullname stored XSS.

Action-Not Available
Vendor-n/aCodeAstro
Product-membership_management_systemn/amembership_management_system
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8368
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.36% / 57.72%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 05:00
Updated-23 Oct, 2025 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Hospital Management System Login index.php sql injection

A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-hospital_management_systemHospital Management Systemhospital_management_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-45508
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 47.64%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 00:00
Updated-04 Sep, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.

Action-Not Available
Vendor-htmldoc_projectn/ahtmldoc
Product-htmldocn/ahtmldoc
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45522
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 25.63%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 00:00
Updated-05 Sep, 2024 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linen before cd37c3e does not verify that the domain is linen.dev or www.linen.dev when resetting a password. This occurs in create in apps/web/pages/api/forgot-password/index.ts.

Action-Not Available
Vendor-linenn/alinen
Product-linenn/alinen
CWE ID-CWE-284
Improper Access Control
CVE-2024-45509
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 33.87%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 00:00
Updated-04 Sep, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MISP through 2.4.196, app/Controller/BookmarksController.php does not properly restrict access to bookmarks data in the case where the user is not an org admin.

Action-Not Available
Vendor-mispn/amisp
Product-mispn/amisp
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-4539
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-5.15% / 89.63%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 09:35
Updated-19 Sep, 2024 | 13:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass

The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.

Action-Not Available
Vendor-miniorangecyberlord92miniorange
Product-web_application_firewallWeb Application Firewall – website securityweb_application_firewall
CWE ID-CWE-348
Use of Less Trusted Source
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-7717
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.89% / 75.08%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 08:35
Updated-20 Sep, 2024 | 00:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Events Manager <= 2.1.11 - Authenticated (Subscriber+) Time-Based SQL Injection

The WP Events Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter in all versions up to, and including, 2.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Action-Not Available
Vendor-ThimPress (PhysCode)
Product-wp_events_managerWP Events Managerwp_events_manager
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2022-4536
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.28%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 08:35
Updated-28 Aug, 2025 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IP Vault – WP Firewall <= 1.1 - IP Address Spoofing to Protection Mechanism Bypass

The IP Vault – WP Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.

Action-Not Available
Vendor-youtagyoutagyoutag
Product-two-factor_authenticationTwo-factor authentication (formerly IP Vault)two-factor_authentication
CWE ID-CWE-348
Use of Less Trusted Source
CVE-2022-4100
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.67%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 08:35
Updated-20 Sep, 2024 | 00:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Cerber Security <= 9.4 - IP Protection Bypass

The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been blocked to bypass this control by setting the X-Forwarded-For: HTTP header to an IP Address that hasn't been blocked.

Action-Not Available
Vendor-wpcerbergionigioni
Product-cerber_security_antispam_\&_malware_scanWP Cerber Security, Anti-spam & Malware Scanwp_cerber_security
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-39579
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 27.92%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 07:40
Updated-03 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contains an incorrect privilege assignment vulnerability. A local high privileged attacker could potentially exploit this vulnerability to gain root-level access.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-8276
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.35% / 57.20%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 07:36
Updated-13 Sep, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WPZOOM Portfolio Lite – Filterable Portfolio Plugin <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via align Attribute

The WPZOOM Portfolio Lite – Filterable Portfolio Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:wpzoom-blocks' Gutenberg block in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-wpzoomwpzoomwpzoom
Product-wpzoom_portfolioWPZOOM Portfolio Lite – Filterable Portfolio Pluginwpzoom_portfolio
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-3886
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.97% / 76.22%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 04:29
Updated-03 Sep, 2024 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tagDiv Composer <= 5.0 - Reflected Cross-Site Scripting via envato_code[]

The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘envato_code[]’ parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_check_envato_code function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-tagdivtagDivtagdiv
Product-tagdiv_composertagDiv Composercomposer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-5212
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.84% / 74.33%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 04:29
Updated-03 Sep, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tagDiv Composer <= 5.0 - Reflected Cross-Site Scripting via envato_code[]

The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘envato_code[]’ parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_register_forum_user function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-tagdivtagDivtagdiv
Product-tagdiv_composertagDiv Composercomposer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-7435
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-1.70% / 81.94%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 02:33
Updated-10 Jul, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Attire <= 2.0.6 - Authenticated (Contributor+) PHP Object Injection

The Attire theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.0.6 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

Action-Not Available
Vendor-WordPress Attire (Shafaet Alam)
Product-attireAttireattire_blocks
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2024-6586
Assigner-Mandiant Inc.
ShareView Details
Assigner-Mandiant Inc.
CVSS Score-7.3||HIGH
EPSS-20.00% / 95.32%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 22:25
Updated-03 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.

Action-Not Available
Vendor-Lightdashlightdash
Product-Lightdashlightdash
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2024-6585
Assigner-Mandiant Inc.
ShareView Details
Assigner-Mandiant Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.19% / 40.66%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 22:17
Updated-03 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stored cross-site scripting (“XSS”) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user’s session with the application.

Action-Not Available
Vendor-Lightdashlightdash
Product-Lightdashlightdash
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8348
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.22% / 44.87%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 21:31
Updated-04 Sep, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Computer Laboratory Management System Master.php delete_category sql injection

A vulnerability, which was classified as critical, has been found in SourceCodester Computer Laboratory Management System 1.0. Affected by this issue is the function delete_category of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-computer_laboratory_management_systemComputer Laboratory Management Systemcomputer_laboratory_management_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-8347
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.22% / 44.87%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 21:31
Updated-04 Sep, 2024 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Computer Laboratory Management System Master.php delete_record sql injection

A vulnerability classified as critical was found in SourceCodester Computer Laboratory Management System 1.0. Affected by this vulnerability is the function delete_record of the file /classes/Master.php?f=delete_record. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-computer_laboratory_management_systemComputer Laboratory Management Systemcomputer_laboratory_management_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-8346
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.22% / 44.87%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 20:31
Updated-04 Sep, 2024 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Computer Laboratory Management System SystemSettings.php update_settings_info sql injection

A vulnerability classified as critical has been found in SourceCodester Computer Laboratory Management System 1.0. Affected is the function update_settings_info of the file /classes/SystemSettings.php?f=update_settings. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-computer_laboratory_management_systemComputer Laboratory Management Systemcomputer_laboratory_management_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-6204
Assigner-ManageEngine
ShareView Details
Assigner-ManageEngine
CVSS Score-8.3||HIGH
EPSS-0.26% / 49.37%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 17:10
Updated-19 Sep, 2024 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL injection

Zohocorp ManageEngine Exchange Reporter Plus versions before 5715 are vulnerable to SQL Injection in the reports module.

Action-Not Available
Vendor-ManageEngine (Zoho Corporation Pvt. Ltd.)Zoho Corporation Pvt. Ltd.
Product-manageengine_exchange_reporter_plusExchange Reporter Plusmanageengine_exchange_reporter_plus
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-8345
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.59%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 17:00
Updated-04 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Music Gallery Site Users.php sql injection

A vulnerability was found in SourceCodester Music Gallery Site 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-music_gallery_siteMusic Gallery Sitemusic_gallery_site
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-45047
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.36% / 57.76%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 16:55
Updated-25 Sep, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential mXSS vulnerability due to improper HTML escaping in svelte

svelte performance oriented web framework. A potential mXSS vulnerability exists in Svelte for versions up to but not including 4.2.19. Svelte improperly escapes HTML on server-side rendering. The assumption is that attributes will always stay as such, but in some situation the final DOM tree rendered on browsers is different from what Svelte expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). More specifically, this can occur when injecting malicious content into an attribute within a `noscript` tag. This issue has been addressed in release version 4.2.19. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-sveltesveltejssvelte
Product-sveltesveltesvelte
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8344
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 26.94%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 16:31
Updated-03 Sep, 2024 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Campcodes Supplier Management System edit_area.php sql injection

A vulnerability has been found in Campcodes Supplier Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_area.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-CampCodes
Product-supplier_management_systemSupplier Management Systemsupplier_management_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-8343
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.10% / 28.58%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 16:00
Updated-04 Sep, 2024 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Sentiment Based Movie Rating System User Registration Users.php sql injection

A vulnerability, which was classified as critical, was found in SourceCodester Sentiment Based Movie Rating System 1.0. Affected is an unknown function of the file /classes/Users.php?f=save_client of the component User Registration Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-sentiment_based_movie_rating_systemSentiment Based Movie Rating Systemsentiment_based_movie_rating_system
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-8342
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.30%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 15:31
Updated-04 Sep, 2024 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Petshop Management System add_client.php unrestricted upload

A vulnerability, which was classified as critical, has been found in SourceCodester Petshop Management System 1.0. This issue affects some unknown processing of the file /controllers/add_client.php. The manipulation of the argument image_profile leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-nelzkie15SourceCodester
Product-petshop_management_systemPetshop Management Systempetshop_management_system
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-8341
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.66%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 15:00
Updated-04 Sep, 2024 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Petshop Management System add_user.php unrestricted upload

A vulnerability classified as critical was found in SourceCodester Petshop Management System 1.0. This vulnerability affects unknown code of the file /controllers/add_user.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-nelzkie15SourceCodester
Product-pet_shop_management_systemPetshop Management Systempetshop_management_system
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 13
  • 14
  • Next