Skip to content

Commit 9a958b9

Browse files
committed
Auto-Update: 2026-02-26T03:00:11.802191+00:00
1 parent a4d59fd commit 9a958b9

File tree

64 files changed

+4111
-213
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+4111
-213
lines changed

CVE-2019/CVE-2019-254xx/CVE-2019-25435.json

Lines changed: 36 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2019-25435",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-02-20T23:16:00.247",
5-
"lastModified": "2026-02-23T18:14:13.887",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-26T02:33:51.807",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "Sricam DeviceViewer 3.12.0.1 contains a local buffer overflow vulnerability in the user management add user function that allows authenticated attackers to execute arbitrary code by bypassing data execution prevention. Attackers can inject a malicious payload through the Username field in User Management to trigger a stack-based buffer overflow and execute commands via ROP chain gadgets."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Sricam DeviceViewer 3.12.0.1 contiene una vulnerabilidad de desbordamiento de b\u00fafer local en la funci\u00f3n de a\u00f1adir usuario de la gesti\u00f3n de usuarios que permite a atacantes autenticados ejecutar c\u00f3digo arbitrario evadiendo la prevenci\u00f3n de ejecuci\u00f3n de datos. Los atacantes pueden inyectar una carga \u00fatil maliciosa a trav\u00e9s del campo Nombre de usuario en Gesti\u00f3n de usuarios para desencadenar un desbordamiento de b\u00fafer basado en pila y ejecutar comandos a trav\u00e9s de gadgets de cadena ROP."
1216
}
1317
],
1418
"metrics": {
@@ -91,18 +95,45 @@
9195
]
9296
}
9397
],
98+
"configurations": [
99+
{
100+
"nodes": [
101+
{
102+
"operator": "OR",
103+
"negate": false,
104+
"cpeMatch": [
105+
{
106+
"vulnerable": true,
107+
"criteria": "cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:*",
108+
"matchCriteriaId": "F73864E9-E3A6-4B86-A1D8-E80349157F31"
109+
}
110+
]
111+
}
112+
]
113+
}
114+
],
94115
"references": [
95116
{
96117
"url": "https://www.exploit-db.com/exploits/47477",
97-
"source": "disclosure@vulncheck.com"
118+
"source": "disclosure@vulncheck.com",
119+
"tags": [
120+
"Exploit",
121+
"VDB Entry"
122+
]
98123
},
99124
{
100125
"url": "https://www.sricam.com/",
101-
"source": "disclosure@vulncheck.com"
126+
"source": "disclosure@vulncheck.com",
127+
"tags": [
128+
"Product"
129+
]
102130
},
103131
{
104132
"url": "https://www.vulncheck.com/advisories/sricam-deviceviewer-local-buffer-overflow-dep-bypass",
105-
"source": "disclosure@vulncheck.com"
133+
"source": "disclosure@vulncheck.com",
134+
"tags": [
135+
"Third Party Advisory"
136+
]
106137
}
107138
]
108139
}

CVE-2019/CVE-2019-254xx/CVE-2019-25436.json

Lines changed: 36 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2019-25436",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-02-20T23:16:00.453",
5-
"lastModified": "2026-02-23T18:14:13.887",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-26T02:33:11.467",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "Sricam DeviceViewer 3.12.0.1 contains a password change security bypass vulnerability that allows authenticated users to change passwords without proper validation of the old password field. Attackers can inject a large payload into the old password parameter during the change password process to bypass validation and set an arbitrary new password."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Sricam DeviceViewer 3.12.0.1 contiene una vulnerabilidad de omisi\u00f3n de seguridad en el cambio de contrase\u00f1a que permite a usuarios autenticados cambiar contrase\u00f1as sin la validaci\u00f3n adecuada del campo de contrase\u00f1a antigua. Los atacantes pueden inyectar una carga \u00fatil grande en el par\u00e1metro de contrase\u00f1a antigua durante el proceso de cambio de contrase\u00f1a para omitir la validaci\u00f3n y establecer una nueva contrase\u00f1a arbitraria."
1216
}
1317
],
1418
"metrics": {
@@ -91,18 +95,45 @@
9195
]
9296
}
9397
],
98+
"configurations": [
99+
{
100+
"nodes": [
101+
{
102+
"operator": "OR",
103+
"negate": false,
104+
"cpeMatch": [
105+
{
106+
"vulnerable": true,
107+
"criteria": "cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:*",
108+
"matchCriteriaId": "F73864E9-E3A6-4B86-A1D8-E80349157F31"
109+
}
110+
]
111+
}
112+
]
113+
}
114+
],
94115
"references": [
95116
{
96117
"url": "http://www.sricam.com/",
97-
"source": "disclosure@vulncheck.com"
118+
"source": "disclosure@vulncheck.com",
119+
"tags": [
120+
"Product"
121+
]
98122
},
99123
{
100124
"url": "https://www.exploit-db.com/exploits/47476",
101-
"source": "disclosure@vulncheck.com"
125+
"source": "disclosure@vulncheck.com",
126+
"tags": [
127+
"Exploit",
128+
"VDB Entry"
129+
]
102130
},
103131
{
104132
"url": "https://www.vulncheck.com/advisories/sricam-deviceviewer-password-change-security-bypass",
105-
"source": "disclosure@vulncheck.com"
133+
"source": "disclosure@vulncheck.com",
134+
"tags": [
135+
"Third Party Advisory"
136+
]
106137
}
107138
]
108139
}

CVE-2019/CVE-2019-254xx/CVE-2019-25438.json

Lines changed: 57 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2019-25438",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-02-20T23:16:00.820",
5-
"lastModified": "2026-02-23T18:14:13.887",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-26T02:32:08.153",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "LabCollector 5.423 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through POST parameters. Attackers can submit crafted SQL payloads in the login parameter of login.php or the user_name parameter of retrieve_password.php to extract sensitive database information without authentication."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "LabCollector 5.423 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL que permiten a atacantes no autenticados ejecutar comandos SQL arbitrarios inyectando c\u00f3digo malicioso a trav\u00e9s de par\u00e1metros POST. Los atacantes pueden enviar cargas \u00fatiles SQL manipuladas en el par\u00e1metro login de login.php o el par\u00e1metro user_name de retrieve_password.php para extraer informaci\u00f3n sensible de la base de datos sin autenticaci\u00f3n."
1216
}
1317
],
1418
"metrics": {
@@ -59,7 +63,7 @@
5963
"cvssMetricV31": [
6064
{
6165
"source": "disclosure@vulncheck.com",
62-
"type": "Primary",
66+
"type": "Secondary",
6367
"cvssData": {
6468
"version": "3.1",
6569
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
@@ -76,6 +80,26 @@
7680
},
7781
"exploitabilityScore": 3.9,
7882
"impactScore": 4.2
83+
},
84+
{
85+
"source": "nvd@nist.gov",
86+
"type": "Primary",
87+
"cvssData": {
88+
"version": "3.1",
89+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
90+
"baseScore": 7.5,
91+
"baseSeverity": "HIGH",
92+
"attackVector": "NETWORK",
93+
"attackComplexity": "LOW",
94+
"privilegesRequired": "NONE",
95+
"userInteraction": "NONE",
96+
"scope": "UNCHANGED",
97+
"confidentialityImpact": "HIGH",
98+
"integrityImpact": "NONE",
99+
"availabilityImpact": "NONE"
100+
},
101+
"exploitabilityScore": 3.9,
102+
"impactScore": 3.6
79103
}
80104
]
81105
},
@@ -91,18 +115,45 @@
91115
]
92116
}
93117
],
118+
"configurations": [
119+
{
120+
"nodes": [
121+
{
122+
"operator": "OR",
123+
"negate": false,
124+
"cpeMatch": [
125+
{
126+
"vulnerable": true,
127+
"criteria": "cpe:2.3:a:agilebio:labcollector:5.423:*:*:*:*:*:*:*",
128+
"matchCriteriaId": "F800D0C9-28EB-4288-B4D6-ADC597021BB2"
129+
}
130+
]
131+
}
132+
]
133+
}
134+
],
94135
"references": [
95136
{
96137
"url": "https://labcollector.com/",
97-
"source": "disclosure@vulncheck.com"
138+
"source": "disclosure@vulncheck.com",
139+
"tags": [
140+
"Product"
141+
]
98142
},
99143
{
100144
"url": "https://www.exploit-db.com/exploits/47460",
101-
"source": "disclosure@vulncheck.com"
145+
"source": "disclosure@vulncheck.com",
146+
"tags": [
147+
"Exploit",
148+
"VDB Entry"
149+
]
102150
},
103151
{
104152
"url": "https://www.vulncheck.com/advisories/labcollector-sql-injection-via-loginphp",
105-
"source": "disclosure@vulncheck.com"
153+
"source": "disclosure@vulncheck.com",
154+
"tags": [
155+
"Third Party Advisory"
156+
]
106157
}
107158
]
108159
}

CVE-2019/CVE-2019-254xx/CVE-2019-25444.json

Lines changed: 53 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,17 @@
22
"id": "CVE-2019-25444",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-02-20T19:23:13.763",
5-
"lastModified": "2026-02-23T18:14:13.887",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-26T02:37:40.180",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
1111
"value": "Fiverr Clone Script 1.2.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the page parameter. Attackers can supply malicious SQL syntax in the page parameter to extract sensitive database information or modify database contents."
12+
},
13+
{
14+
"lang": "es",
15+
"value": "Fiverr Clone Script 1.2.2 contiene una vulnerabilidad de inyecci\u00f3n SQL que permite a atacantes no autenticados manipular consultas a la base de datos inyectando c\u00f3digo SQL a trav\u00e9s del par\u00e1metro page. Los atacantes pueden suministrar sintaxis SQL maliciosa en el par\u00e1metro page para extraer informaci\u00f3n sensible de la base de datos o modificar el contenido de la base de datos."
1216
}
1317
],
1418
"metrics": {
@@ -59,7 +63,7 @@
5963
"cvssMetricV31": [
6064
{
6165
"source": "disclosure@vulncheck.com",
62-
"type": "Primary",
66+
"type": "Secondary",
6367
"cvssData": {
6468
"version": "3.1",
6569
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
@@ -76,6 +80,26 @@
7680
},
7781
"exploitabilityScore": 3.9,
7882
"impactScore": 4.2
83+
},
84+
{
85+
"source": "nvd@nist.gov",
86+
"type": "Primary",
87+
"cvssData": {
88+
"version": "3.1",
89+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
90+
"baseScore": 9.1,
91+
"baseSeverity": "CRITICAL",
92+
"attackVector": "NETWORK",
93+
"attackComplexity": "LOW",
94+
"privilegesRequired": "NONE",
95+
"userInteraction": "NONE",
96+
"scope": "UNCHANGED",
97+
"confidentialityImpact": "HIGH",
98+
"integrityImpact": "HIGH",
99+
"availabilityImpact": "NONE"
100+
},
101+
"exploitabilityScore": 3.9,
102+
"impactScore": 5.2
79103
}
80104
]
81105
},
@@ -91,14 +115,38 @@
91115
]
92116
}
93117
],
118+
"configurations": [
119+
{
120+
"nodes": [
121+
{
122+
"operator": "OR",
123+
"negate": false,
124+
"cpeMatch": [
125+
{
126+
"vulnerable": true,
127+
"criteria": "cpe:2.3:a:phpscriptsmall:fiverr_clone_script:1.2.2:*:*:*:*:*:*:*",
128+
"matchCriteriaId": "C2626151-F755-4F13-BB43-5FC82E818DC7"
129+
}
130+
]
131+
}
132+
]
133+
}
134+
],
94135
"references": [
95136
{
96137
"url": "https://www.exploit-db.com/exploits/46637",
97-
"source": "disclosure@vulncheck.com"
138+
"source": "disclosure@vulncheck.com",
139+
"tags": [
140+
"Exploit",
141+
"VDB Entry"
142+
]
98143
},
99144
{
100145
"url": "https://www.vulncheck.com/advisories/fiverr-clone-script-sql-injection-via-page-parameter",
101-
"source": "disclosure@vulncheck.com"
146+
"source": "disclosure@vulncheck.com",
147+
"tags": [
148+
"Third Party Advisory"
149+
]
102150
}
103151
]
104152
}

0 commit comments

Comments
 (0)