Skip to content

Commit e244ad9

Browse files
1 parent 7950f46 commit e244ad9

File tree

2 files changed

+108
-0
lines changed

2 files changed

+108
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fqq7-h225-8w6h",
4+
"modified": "2025-11-09T09:30:15Z",
5+
"published": "2025-11-09T09:30:15Z",
6+
"aliases": [
7+
"CVE-2025-12918"
8+
],
9+
"details": "A security flaw has been discovered in yungifez Skuul School Management System up to 2.6.5. The impacted element is an unknown function of the file /dashboard/fees/fee-invoices/ of the component View Fee Invoice. Performing manipulation of the argument invoice_id results in improper control of resource identifiers. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12918"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://gist.github.com/thezeekhan/fbfa9a7dbc0b0b81fd868ee166839041"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://gist.github.com/thezeekhan/fbfa9a7dbc0b0b81fd868ee166839041#steps-to-reproduce"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?ctiid.331636"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?id.331636"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://vuldb.com/?submit.680686"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-99"
50+
],
51+
"severity": "LOW",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2025-11-09T08:15:38Z"
55+
}
56+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vvg5-qhqr-r6vw",
4+
"modified": "2025-11-09T09:30:15Z",
5+
"published": "2025-11-09T09:30:15Z",
6+
"aliases": [
7+
"CVE-2025-12917"
8+
],
9+
"details": "A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected element is an unknown function of the file /reqproc/proc_post of the component Reboot Handler. Such manipulation leads to denial of service. Access to the local network is required for this attack to succeed. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12917"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://vuldb.com/?ctiid.331635"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?id.331635"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?submit.679507"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://youtu.be/3Me3wlH5cfU"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-404"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-11-09T08:15:35Z"
51+
}
52+
}

0 commit comments

Comments
 (0)