code-projects Client Details System 1.0 kura hakki ndiyam
Gaskiya vulnerability da aka ware a matsayin kura an samu a code-projects Client Details System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil $software_file, a cikin sashen $software_component. A sa manipulation ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-639. Hakika, rauni an bayyana shi 10/26/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-12283. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ba ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
3 Goyarwa · 84 Datenpunkte
| Furɗe | Súgá 10/26/2025 17:22 | Gargadi 1/2 10/26/2025 17:23 | Gargadi 2/2 10/27/2025 23:42 |
|---|---|---|---|
| software_vendor | code-projects | code-projects | code-projects |
| software_name | Client Details System | Client Details System | Client Details System |
| software_version | 1.0 | 1.0 | 1.0 |
| vulnerability_risk | 2 | 2 | 2 |
| cvss3_vuldb_av | N | N | N |
| cvss3_vuldb_ac | L | L | L |
| cvss3_vuldb_pr | L | L | L |
| cvss3_vuldb_ui | N | N | N |
| cvss3_vuldb_s | U | U | U |
| cvss3_vuldb_c | L | L | L |
| cvss3_vuldb_i | N | N | N |
| cvss3_vuldb_a | N | N | N |
| cvss3_vuldb_e | P | P | P |
| cvss3_vuldb_rc | R | R | R |
| advisory_url | https://github.com/hellonewbie/tutorial/issues/11 | https://github.com/hellonewbie/tutorial/issues/11 | https://github.com/hellonewbie/tutorial/issues/11 |
| exploit_availability | 1 | 1 | 1 |
| exploit_publicity | 1 | 1 | 1 |
| exploit_url | https://github.com/hellonewbie/tutorial/issues/11 | https://github.com/hellonewbie/tutorial/issues/11 | https://github.com/hellonewbie/tutorial/issues/11 |
| source_cve | CVE-2025-12283 | CVE-2025-12283 | CVE-2025-12283 |
| cna_responsible | VulDB | VulDB | VulDB |
| software_type | Project Management Software | Project Management Software | Project Management Software |
| cvss2_vuldb_av | N | N | N |
| cvss2_vuldb_ac | L | L | L |
| cvss2_vuldb_ci | P | P | P |
| cvss2_vuldb_ii | N | N | N |
| cvss2_vuldb_ai | N | N | N |
| cvss2_vuldb_e | POC | POC | POC |
| cvss2_vuldb_rc | UR | UR | UR |
| cvss4_vuldb_av | N | N | N |
| cvss4_vuldb_ac | L | L | L |
| cvss4_vuldb_pr | L | L | L |
| cvss4_vuldb_ui | N | N | N |
| cvss4_vuldb_vc | L | L | L |
| cvss4_vuldb_vi | N | N | N |
| cvss4_vuldb_va | N | N | N |
| cvss4_vuldb_e | P | P | P |
| cvss2_vuldb_au | S | S | S |
| cvss2_vuldb_rl | ND | ND | ND |
| cvss3_vuldb_rl | X | X | X |
| cvss4_vuldb_at | N | N | N |
| cvss4_vuldb_sc | N | N | N |
| cvss4_vuldb_si | N | N | N |
| cvss4_vuldb_sa | N | N | N |
| cvss2_vuldb_basescore | 4.0 | 4.0 | 4.0 |
| cvss2_vuldb_tempscore | 3.4 | 3.4 | 3.4 |
| cvss3_vuldb_basescore | 4.3 | 4.3 | 4.3 |
| cvss3_vuldb_tempscore | 3.9 | 3.9 | 3.9 |
| cvss3_meta_basescore | 4.3 | 4.3 | 4.3 |
| cvss3_meta_tempscore | 3.9 | 3.9 | 4.1 |
| cvss4_vuldb_bscore | 5.3 | 5.3 | 5.3 |
| cvss4_vuldb_btscore | 2.1 | 2.1 | 2.1 |
| advisory_date | 1761429600 (10/26/2025) | 1761429600 (10/26/2025) | 1761429600 (10/26/2025) |
| price_0day | $0-$5k | $0-$5k | $0-$5k |
| vulnerability_cwe | CWE-639 (kura hakki ndiyam) | CWE-639 (kura hakki ndiyam) | |
| cvss4_cna_sa | N | ||
| cvss4_cna_bscore | 5.3 | ||
| cvss3_cna_av | N | ||
| cvss3_cna_ac | L | ||
| cvss3_cna_pr | L | ||
| cvss3_cna_ui | N | ||
| cvss3_cna_s | U | ||
| cvss3_cna_c | L | ||
| cvss3_cna_i | N | ||
| cvss3_cna_a | N | ||
| cvss3_cna_basescore | 4.3 | ||
| cvss2_cna_av | N | ||
| cvss2_cna_ac | L | ||
| cvss2_cna_au | S | ||
| cvss2_cna_ci | P | ||
| cvss2_cna_ii | N | ||
| cvss2_cna_ai | N | ||
| cvss2_cna_basescore | 4 | ||
| cve_nvd_summary | A security flaw has been discovered in code-projects Client Details System 1.0. The impacted element is an unknown function. The manipulation results in authorization bypass. The attack can be launched remotely. The exploit has been released to the public and may be exploited. | ||
| cvss4_cna_av | N | ||
| cvss4_cna_ac | L | ||
| cvss4_cna_at | N | ||
| cvss4_cna_pr | L | ||
| cvss4_cna_ui | N | ||
| cvss4_cna_vc | L | ||
| cvss4_cna_vi | N | ||
| cvss4_cna_va | N | ||
| cvss4_cna_sc | N | ||
| cvss4_cna_si | N |