code-projects Client Details System 1.0 kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a code-projects Client Details System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil $software_file, a cikin sashen $software_component. A sa manipulation ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-639. Hakika, rauni an bayyana shi 10/26/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-12283. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ba ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 Goyarwa · 84 Datenpunkte

FurɗeSúgá
10/26/2025 17:22
Gargadi 1/2
10/26/2025 17:23
Gargadi 2/2
10/27/2025 23:42
software_vendorcode-projectscode-projectscode-projects
software_nameClient Details SystemClient Details SystemClient Details System
software_version1.01.01.0
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iNNN
cvss3_vuldb_aNNN
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/hellonewbie/tutorial/issues/11https://github.com/hellonewbie/tutorial/issues/11https://github.com/hellonewbie/tutorial/issues/11
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/hellonewbie/tutorial/issues/11https://github.com/hellonewbie/tutorial/issues/11https://github.com/hellonewbie/tutorial/issues/11
source_cveCVE-2025-12283CVE-2025-12283CVE-2025-12283
cna_responsibleVulDBVulDBVulDB
software_typeProject Management SoftwareProject Management SoftwareProject Management Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiNNN
cvss2_vuldb_aiNNN
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_prLLL
cvss4_vuldb_uiNNN
cvss4_vuldb_vcLLL
cvss4_vuldb_viNNN
cvss4_vuldb_vaNNN
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore4.04.04.0
cvss2_vuldb_tempscore3.43.43.4
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore3.93.93.9
cvss3_meta_basescore4.34.34.3
cvss3_meta_tempscore3.93.94.1
cvss4_vuldb_bscore5.35.35.3
cvss4_vuldb_btscore2.12.12.1
advisory_date1761429600 (10/26/2025)1761429600 (10/26/2025)1761429600 (10/26/2025)
price_0day$0-$5k$0-$5k$0-$5k
vulnerability_cweCWE-639 (kura hakki ndiyam)CWE-639 (kura hakki ndiyam)
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore4
cve_nvd_summaryA security flaw has been discovered in code-projects Client Details System 1.0. The impacted element is an unknown function. The manipulation results in authorization bypass. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viN
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN

Do you need the next level of professionalism?

Upgrade your account now!