Medium - CVE-2024-13689 - The Uncode Core plugin for WordPress is...
The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action...
NA - CVE-2024-57045 - A vulnerability in the D-Link DIR-859 router...
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password...
NA - CVE-2024-57046 - A vulnerability in the Netgear DGN2200 router...
A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested...
NA - CVE-2024-57049 - A vulnerability in the TP-Link Archer c20...
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi...
NA - CVE-2024-57050 - A vulnerability in the TP-Link WR840N v6 router...
A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi...
NA - CVE-2025-21702 - In the Linux kernel, the following...
In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler's limit,...
NA - CVE-2025-21703 - In the Linux kernel, the following...
In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child...
NA - CVE-2024-55460 - A time-based SQL injection vulnerability in the...
A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input.