Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | OpenEMR security issue | https://github.com/Wezery/CVE-2019-14530 | POC Details |
| 2 | OpenEMR < 5.0.2 - (Authenticated) Path Traversal - Local File Disclosure | https://github.com/sec-it/exploit-CVE-2019-14530 | POC Details |
| 3 | OpenEMR before 5.0.2 is vulnerable to local file inclusion via the fileName parameter in custom/ajax_download.php. An attacker can download any file (that is readable by the web server user) from server storage. If the requested file is writable for the web server user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, the file will be deleted from server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-14530.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet