Skip to content

Commit 2c443e7

Browse files
committed
Auto-Update: 2026-02-27T13:00:13.723905+00:00
1 parent 126e234 commit 2c443e7

File tree

9 files changed

+709
-42
lines changed

9 files changed

+709
-42
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"id": "CVE-2025-11251",
3+
"sourceIdentifier": "iletisim@usom.gov.tr",
4+
"published": "2026-02-27T12:16:01.783",
5+
"lastModified": "2026-02-27T12:16:01.783",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dayneks Software Industry and Trade Inc. E-Commerce Platform allows SQL Injection.This issue affects E-Commerce Platform: through 27022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "iletisim@usom.gov.tr",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
22+
"baseScore": 9.8,
23+
"baseSeverity": "CRITICAL",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 5.9
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "iletisim@usom.gov.tr",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-89"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://www.usom.gov.tr/bildirim/tr-26-0084",
53+
"source": "iletisim@usom.gov.tr"
54+
}
55+
]
56+
}

CVE-2025/CVE-2025-472xx/CVE-2025-47205.json

Lines changed: 225 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2025-47205",
33
"sourceIdentifier": "security@qnapsecurity.com.tw",
44
"published": "2026-02-11T13:15:52.287",
5-
"lastModified": "2026-02-11T15:27:26.370",
6-
"vulnStatus": "Undergoing Analysis",
5+
"lastModified": "2026-02-27T12:59:14.410",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -59,6 +59,28 @@
5959
"providerUrgency": "NOT_DEFINED"
6060
}
6161
}
62+
],
63+
"cvssMetricV31": [
64+
{
65+
"source": "nvd@nist.gov",
66+
"type": "Primary",
67+
"cvssData": {
68+
"version": "3.1",
69+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
70+
"baseScore": 4.9,
71+
"baseSeverity": "MEDIUM",
72+
"attackVector": "NETWORK",
73+
"attackComplexity": "LOW",
74+
"privilegesRequired": "HIGH",
75+
"userInteraction": "NONE",
76+
"scope": "UNCHANGED",
77+
"confidentialityImpact": "NONE",
78+
"integrityImpact": "NONE",
79+
"availabilityImpact": "HIGH"
80+
},
81+
"exploitabilityScore": 1.2,
82+
"impactScore": 3.6
83+
}
6284
]
6385
},
6486
"weaknesses": [
@@ -73,10 +95,210 @@
7395
]
7496
}
7597
],
98+
"configurations": [
99+
{
100+
"nodes": [
101+
{
102+
"operator": "OR",
103+
"negate": false,
104+
"cpeMatch": [
105+
{
106+
"vulnerable": true,
107+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
108+
"matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7"
109+
},
110+
{
111+
"vulnerable": true,
112+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
113+
"matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D"
114+
},
115+
{
116+
"vulnerable": true,
117+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
118+
"matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B"
119+
},
120+
{
121+
"vulnerable": true,
122+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
123+
"matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A"
124+
},
125+
{
126+
"vulnerable": true,
127+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
128+
"matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23"
129+
},
130+
{
131+
"vulnerable": true,
132+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
133+
"matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71"
134+
},
135+
{
136+
"vulnerable": true,
137+
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
138+
"matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C"
139+
},
140+
{
141+
"vulnerable": true,
142+
"criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
143+
"matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7"
144+
},
145+
{
146+
"vulnerable": true,
147+
"criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
148+
"matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4"
149+
},
150+
{
151+
"vulnerable": true,
152+
"criteria": "cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*",
153+
"matchCriteriaId": "82464467-E1E6-47E1-BDE5-DDFA52994A47"
154+
},
155+
{
156+
"vulnerable": true,
157+
"criteria": "cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*",
158+
"matchCriteriaId": "75AE902C-0516-4341-9BF0-21D8803E091C"
159+
},
160+
{
161+
"vulnerable": true,
162+
"criteria": "cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*",
163+
"matchCriteriaId": "5B005D70-8C91-48D4-B09A-9EBE2E9E5090"
164+
},
165+
{
166+
"vulnerable": true,
167+
"criteria": "cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*",
168+
"matchCriteriaId": "82FE5F89-A0E1-4D1B-A363-0A0D4141F502"
169+
},
170+
{
171+
"vulnerable": true,
172+
"criteria": "cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*",
173+
"matchCriteriaId": "B21A9EE0-88D5-42D9-BA21-D55518FCC6E4"
174+
},
175+
{
176+
"vulnerable": true,
177+
"criteria": "cpe:2.3:o:qnap:qts:5.2.6.3195:build_20250715:*:*:*:*:*:*",
178+
"matchCriteriaId": "3B575CF2-21F3-4435-B6B4-61D79B34429C"
179+
},
180+
{
181+
"vulnerable": true,
182+
"criteria": "cpe:2.3:o:qnap:qts:5.2.6.3229:build_20250818:*:*:*:*:*:*",
183+
"matchCriteriaId": "E2EBD305-91E3-4BCC-835B-4878DF4DA3B8"
184+
},
185+
{
186+
"vulnerable": true,
187+
"criteria": "cpe:2.3:o:qnap:qts:5.2.7.3256:build_20250913:*:*:*:*:*:*",
188+
"matchCriteriaId": "554CB021-1477-4E63-8EBA-74056B4D8DA7"
189+
},
190+
{
191+
"vulnerable": true,
192+
"criteria": "cpe:2.3:o:qnap:qts:5.2.7.3297:build_20251024:*:*:*:*:*:*",
193+
"matchCriteriaId": "153F90E1-A54F-4B8D-AEEA-4643421AFF7F"
194+
}
195+
]
196+
}
197+
]
198+
},
199+
{
200+
"nodes": [
201+
{
202+
"operator": "OR",
203+
"negate": false,
204+
"cpeMatch": [
205+
{
206+
"vulnerable": true,
207+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
208+
"matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481"
209+
},
210+
{
211+
"vulnerable": true,
212+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
213+
"matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC"
214+
},
215+
{
216+
"vulnerable": true,
217+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
218+
"matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00"
219+
},
220+
{
221+
"vulnerable": true,
222+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
223+
"matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB"
224+
},
225+
{
226+
"vulnerable": true,
227+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
228+
"matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751"
229+
},
230+
{
231+
"vulnerable": true,
232+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
233+
"matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A"
234+
},
235+
{
236+
"vulnerable": true,
237+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
238+
"matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3"
239+
},
240+
{
241+
"vulnerable": true,
242+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
243+
"matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED"
244+
},
245+
{
246+
"vulnerable": true,
247+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
248+
"matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137"
249+
},
250+
{
251+
"vulnerable": true,
252+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
253+
"matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F"
254+
},
255+
{
256+
"vulnerable": true,
257+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*",
258+
"matchCriteriaId": "BF0093B6-8D38-4D1E-AD71-79299123C2B1"
259+
},
260+
{
261+
"vulnerable": true,
262+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*",
263+
"matchCriteriaId": "48A3CDAA-B0C6-4280-B1AC-DDD027F9D632"
264+
},
265+
{
266+
"vulnerable": true,
267+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*",
268+
"matchCriteriaId": "1807DE4F-CDF3-4E3B-ADC1-9535EF1D60FE"
269+
},
270+
{
271+
"vulnerable": true,
272+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*",
273+
"matchCriteriaId": "68FF7342-A0AF-4E75-9CD6-D584B450B8AB"
274+
},
275+
{
276+
"vulnerable": true,
277+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.6.3195:build_20250715:*:*:*:*:*:*",
278+
"matchCriteriaId": "A8E84E3D-943C-4DF5-86D3-DCAC3C034B81"
279+
},
280+
{
281+
"vulnerable": true,
282+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.7.3256:build_20250913:*:*:*:*:*:*",
283+
"matchCriteriaId": "17720E05-1BBF-4605-A777-FA4059B3C2DC"
284+
},
285+
{
286+
"vulnerable": true,
287+
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.7.3297:build_20251024:*:*:*:*:*:*",
288+
"matchCriteriaId": "39CB5F1C-9811-499D-9D32-34B40E0D475E"
289+
}
290+
]
291+
}
292+
]
293+
}
294+
],
76295
"references": [
77296
{
78297
"url": "https://www.qnap.com/en/security-advisory/qsa-26-05",
79-
"source": "security@qnapsecurity.com.tw"
298+
"source": "security@qnapsecurity.com.tw",
299+
"tags": [
300+
"Vendor Advisory"
301+
]
80302
}
81303
]
82304
}
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"id": "CVE-2026-1434",
3+
"sourceIdentifier": "cvd@cert.pl",
4+
"published": "2026-02-27T11:16:04.770",
5+
"lastModified": "2026-02-27T11:16:04.770",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Omega-PSIR is vulnerable to Reflected XSS via the lang parameter. An attacker can craft a malicious URL that, when opened, causes arbitrary JavaScript to execute in the victim\u2019s browser.\n\nThis issue was fixed in 4.6.7."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV40": [
16+
{
17+
"source": "cvd@cert.pl",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "4.0",
21+
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
22+
"baseScore": 5.1,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"attackRequirements": "NONE",
27+
"privilegesRequired": "NONE",
28+
"userInteraction": "ACTIVE",
29+
"vulnConfidentialityImpact": "NONE",
30+
"vulnIntegrityImpact": "NONE",
31+
"vulnAvailabilityImpact": "NONE",
32+
"subConfidentialityImpact": "LOW",
33+
"subIntegrityImpact": "LOW",
34+
"subAvailabilityImpact": "NONE",
35+
"exploitMaturity": "NOT_DEFINED",
36+
"confidentialityRequirement": "NOT_DEFINED",
37+
"integrityRequirement": "NOT_DEFINED",
38+
"availabilityRequirement": "NOT_DEFINED",
39+
"modifiedAttackVector": "NOT_DEFINED",
40+
"modifiedAttackComplexity": "NOT_DEFINED",
41+
"modifiedAttackRequirements": "NOT_DEFINED",
42+
"modifiedPrivilegesRequired": "NOT_DEFINED",
43+
"modifiedUserInteraction": "NOT_DEFINED",
44+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
45+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
46+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
47+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
48+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
49+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
50+
"Safety": "NOT_DEFINED",
51+
"Automatable": "NOT_DEFINED",
52+
"Recovery": "NOT_DEFINED",
53+
"valueDensity": "NOT_DEFINED",
54+
"vulnerabilityResponseEffort": "NOT_DEFINED",
55+
"providerUrgency": "NOT_DEFINED"
56+
}
57+
}
58+
]
59+
},
60+
"weaknesses": [
61+
{
62+
"source": "cvd@cert.pl",
63+
"type": "Primary",
64+
"description": [
65+
{
66+
"lang": "en",
67+
"value": "CWE-79"
68+
}
69+
]
70+
}
71+
],
72+
"references": [
73+
{
74+
"url": "https://cert.pl/posts/2026/02/CVE-2026-1434",
75+
"source": "cvd@cert.pl"
76+
},
77+
{
78+
"url": "https://www.omegapsir.io/",
79+
"source": "cvd@cert.pl"
80+
}
81+
]
82+
}

0 commit comments

Comments
 (0)