Skip to content

Commit 883aefc

Browse files
committed
Auto-Update: 2026-02-26T05:00:12.424657+00:00
1 parent 9a958b9 commit 883aefc

File tree

22 files changed

+1375
-188
lines changed

22 files changed

+1375
-188
lines changed

CVE-2025/CVE-2025-155xx/CVE-2025-15563.json

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2025-15563",
33
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
44
"published": "2026-02-19T11:15:56.983",
5-
"lastModified": "2026-02-20T21:19:24.563",
6-
"vulnStatus": "Undergoing Analysis",
5+
"lastModified": "2026-02-26T03:01:05.477",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "Any unauthenticated user can reset the WorkTime on-prem database configuration by sending a specific HTTP request to the WorkTime server. No authorization check is applied here."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Cualquier usuario no autenticado puede restablecer la configuraci\u00f3n de la base de datos local de WorkTime enviando una solicitud HTTP espec\u00edfica al servidor de WorkTime. No se aplica ninguna comprobaci\u00f3n de autorizaci\u00f3n aqu\u00ed."
1216
}
1317
],
1418
"metrics": {
@@ -47,10 +51,37 @@
4751
]
4852
}
4953
],
54+
"configurations": [
55+
{
56+
"nodes": [
57+
{
58+
"operator": "OR",
59+
"negate": false,
60+
"cpeMatch": [
61+
{
62+
"vulnerable": true,
63+
"criteria": "cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:*",
64+
"versionEndIncluding": "11.8.8",
65+
"matchCriteriaId": "F8A53FE8-6F29-462D-B7EB-C3E4F25DBEC3"
66+
},
67+
{
68+
"vulnerable": true,
69+
"criteria": "cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:*",
70+
"versionEndIncluding": "11.8.8",
71+
"matchCriteriaId": "0A831FDF-1B71-48B4-BA2D-D2EFB151161A"
72+
}
73+
]
74+
}
75+
]
76+
}
77+
],
5078
"references": [
5179
{
5280
"url": "https://r.sec-consult.com/worktime",
53-
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
81+
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
82+
"tags": [
83+
"Third Party Advisory"
84+
]
5485
}
5586
]
5687
}

CVE-2025/CVE-2025-155xx/CVE-2025-15582.json

Lines changed: 86 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2025-15582",
33
"sourceIdentifier": "cna@vuldb.com",
44
"published": "2026-02-20T17:25:09.053",
5-
"lastModified": "2026-02-20T18:57:15.973",
6-
"vulnStatus": "Undergoing Analysis",
5+
"lastModified": "2026-02-26T03:09:26.733",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "A security flaw has been discovered in detronetdip E-commerce 1.0.0. The impacted element is the function Delete/Update of the component Product Management Module. Performing a manipulation of the argument ID results in authorization bypass. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Se ha descubierto una fallo de seguridad en detronetdip E-commerce 1.0.0 que afecta a la funci\u00f3n Eliminar/Actualizar del componente M\u00f3dulo de Gesti\u00f3n de Productos. Si se manipula el argumento ID se provoca una omisi\u00f3n de autorizaci\u00f3n. Es posible explotar el ataque en remoto. El exploit ha sido liberado al p\u00fablico y puede ser usado para ataques. El proyecto fue informado del problema con antelaci\u00f3n a trav\u00e9s de un informe de problema pero no ha respondido a\u00fan."
1216
}
1317
],
1418
"metrics": {
@@ -59,7 +63,7 @@
5963
"cvssMetricV31": [
6064
{
6165
"source": "cna@vuldb.com",
62-
"type": "Primary",
66+
"type": "Secondary",
6367
"cvssData": {
6468
"version": "3.1",
6569
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
@@ -76,6 +80,26 @@
7680
},
7781
"exploitabilityScore": 2.8,
7882
"impactScore": 2.5
83+
},
84+
{
85+
"source": "nvd@nist.gov",
86+
"type": "Primary",
87+
"cvssData": {
88+
"version": "3.1",
89+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
90+
"baseScore": 8.1,
91+
"baseSeverity": "HIGH",
92+
"attackVector": "NETWORK",
93+
"attackComplexity": "LOW",
94+
"privilegesRequired": "LOW",
95+
"userInteraction": "NONE",
96+
"scope": "UNCHANGED",
97+
"confidentialityImpact": "NONE",
98+
"integrityImpact": "HIGH",
99+
"availabilityImpact": "HIGH"
100+
},
101+
"exploitabilityScore": 2.8,
102+
"impactScore": 5.2
79103
}
80104
],
81105
"cvssMetricV2": [
@@ -107,7 +131,7 @@
107131
"weaknesses": [
108132
{
109133
"source": "cna@vuldb.com",
110-
"type": "Primary",
134+
"type": "Secondary",
111135
"description": [
112136
{
113137
"lang": "en",
@@ -118,32 +142,84 @@
118142
"value": "CWE-639"
119143
}
120144
]
145+
},
146+
{
147+
"source": "nvd@nist.gov",
148+
"type": "Primary",
149+
"description": [
150+
{
151+
"lang": "en",
152+
"value": "CWE-639"
153+
}
154+
]
155+
}
156+
],
157+
"configurations": [
158+
{
159+
"nodes": [
160+
{
161+
"operator": "OR",
162+
"negate": false,
163+
"cpeMatch": [
164+
{
165+
"vulnerable": true,
166+
"criteria": "cpe:2.3:a:detronetdip:e-commerce:1.0.0:*:*:*:*:*:*:*",
167+
"matchCriteriaId": "C36062CE-323B-47C8-BFD8-BC932DBD1A52"
168+
}
169+
]
170+
}
171+
]
121172
}
122173
],
123174
"references": [
124175
{
125176
"url": "https://github.com/Nixon-H/Ecommerce-IDOR-Product-Manipulation",
126-
"source": "cna@vuldb.com"
177+
"source": "cna@vuldb.com",
178+
"tags": [
179+
"Exploit",
180+
"Mitigation",
181+
"Third Party Advisory"
182+
]
127183
},
128184
{
129185
"url": "https://github.com/detronetdip/E-commerce/",
130-
"source": "cna@vuldb.com"
186+
"source": "cna@vuldb.com",
187+
"tags": [
188+
"Product"
189+
]
131190
},
132191
{
133192
"url": "https://github.com/detronetdip/E-commerce/issues/23",
134-
"source": "cna@vuldb.com"
193+
"source": "cna@vuldb.com",
194+
"tags": [
195+
"Exploit",
196+
"Issue Tracking",
197+
"Vendor Advisory"
198+
]
135199
},
136200
{
137201
"url": "https://vuldb.com/?ctiid.346486",
138-
"source": "cna@vuldb.com"
202+
"source": "cna@vuldb.com",
203+
"tags": [
204+
"Permissions Required",
205+
"VDB Entry"
206+
]
139207
},
140208
{
141209
"url": "https://vuldb.com/?id.346486",
142-
"source": "cna@vuldb.com"
210+
"source": "cna@vuldb.com",
211+
"tags": [
212+
"Third Party Advisory",
213+
"VDB Entry"
214+
]
143215
},
144216
{
145217
"url": "https://vuldb.com/?submit.754030",
146-
"source": "cna@vuldb.com"
218+
"source": "cna@vuldb.com",
219+
"tags": [
220+
"Third Party Advisory",
221+
"VDB Entry"
222+
]
147223
}
148224
]
149225
}

CVE-2025/CVE-2025-155xx/CVE-2025-15583.json

Lines changed: 86 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2025-15583",
33
"sourceIdentifier": "cna@vuldb.com",
44
"published": "2026-02-20T17:25:09.303",
5-
"lastModified": "2026-02-20T18:57:15.973",
6-
"vulnStatus": "Undergoing Analysis",
5+
"lastModified": "2026-02-26T03:09:55.007",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Se ha identificado una debilidad en detronetdip E-commerce 1.0.0. Esto afecta a la funci\u00f3n get_safe_value del archivo utility/function.PHP. Al manipularla se puede provocar un cross site scripting. El ataque puede ser ejecutado en remoto. El exploit ha sido puesto a disposici\u00f3n del p\u00fablico y podr\u00eda ser usado para ataques. El proyecto fue informado del problema con antelaci\u00f3n a trav\u00e9s de un informe de incidencias pero no ha respondido a\u00fan."
1216
}
1317
],
1418
"metrics": {
@@ -59,7 +63,7 @@
5963
"cvssMetricV31": [
6064
{
6165
"source": "cna@vuldb.com",
62-
"type": "Primary",
66+
"type": "Secondary",
6367
"cvssData": {
6468
"version": "3.1",
6569
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@@ -76,6 +80,26 @@
7680
},
7781
"exploitabilityScore": 2.1,
7882
"impactScore": 1.4
83+
},
84+
{
85+
"source": "nvd@nist.gov",
86+
"type": "Primary",
87+
"cvssData": {
88+
"version": "3.1",
89+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
90+
"baseScore": 5.4,
91+
"baseSeverity": "MEDIUM",
92+
"attackVector": "NETWORK",
93+
"attackComplexity": "LOW",
94+
"privilegesRequired": "LOW",
95+
"userInteraction": "REQUIRED",
96+
"scope": "CHANGED",
97+
"confidentialityImpact": "LOW",
98+
"integrityImpact": "LOW",
99+
"availabilityImpact": "NONE"
100+
},
101+
"exploitabilityScore": 2.3,
102+
"impactScore": 2.7
79103
}
80104
],
81105
"cvssMetricV2": [
@@ -107,7 +131,7 @@
107131
"weaknesses": [
108132
{
109133
"source": "cna@vuldb.com",
110-
"type": "Primary",
134+
"type": "Secondary",
111135
"description": [
112136
{
113137
"lang": "en",
@@ -118,32 +142,84 @@
118142
"value": "CWE-94"
119143
}
120144
]
145+
},
146+
{
147+
"source": "nvd@nist.gov",
148+
"type": "Primary",
149+
"description": [
150+
{
151+
"lang": "en",
152+
"value": "CWE-79"
153+
}
154+
]
155+
}
156+
],
157+
"configurations": [
158+
{
159+
"nodes": [
160+
{
161+
"operator": "OR",
162+
"negate": false,
163+
"cpeMatch": [
164+
{
165+
"vulnerable": true,
166+
"criteria": "cpe:2.3:a:detronetdip:e-commerce:1.0.0:*:*:*:*:*:*:*",
167+
"matchCriteriaId": "C36062CE-323B-47C8-BFD8-BC932DBD1A52"
168+
}
169+
]
170+
}
171+
]
121172
}
122173
],
123174
"references": [
124175
{
125176
"url": "https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-Escape",
126-
"source": "cna@vuldb.com"
177+
"source": "cna@vuldb.com",
178+
"tags": [
179+
"Exploit",
180+
"Mitigation",
181+
"Third Party Advisory"
182+
]
127183
},
128184
{
129185
"url": "https://github.com/detronetdip/E-commerce/",
130-
"source": "cna@vuldb.com"
186+
"source": "cna@vuldb.com",
187+
"tags": [
188+
"Product"
189+
]
131190
},
132191
{
133192
"url": "https://github.com/detronetdip/E-commerce/issues/23",
134-
"source": "cna@vuldb.com"
193+
"source": "cna@vuldb.com",
194+
"tags": [
195+
"Exploit",
196+
"Issue Tracking",
197+
"Vendor Advisory"
198+
]
135199
},
136200
{
137201
"url": "https://vuldb.com/?ctiid.346487",
138-
"source": "cna@vuldb.com"
202+
"source": "cna@vuldb.com",
203+
"tags": [
204+
"Permissions Required",
205+
"VDB Entry"
206+
]
139207
},
140208
{
141209
"url": "https://vuldb.com/?id.346487",
142-
"source": "cna@vuldb.com"
210+
"source": "cna@vuldb.com",
211+
"tags": [
212+
"Third Party Advisory",
213+
"VDB Entry"
214+
]
143215
},
144216
{
145217
"url": "https://vuldb.com/?submit.754033",
146-
"source": "cna@vuldb.com"
218+
"source": "cna@vuldb.com",
219+
"tags": [
220+
"Third Party Advisory",
221+
"VDB Entry"
222+
]
147223
}
148224
]
149225
}

0 commit comments

Comments
 (0)