Portabilis i-Educar ଯେପର୍ଯ୍ୟନ୍ତ 2.10 Cadastrar tabela de arredondamento Page edit Nome କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Portabilis i-Educar ଯେପର୍ଯ୍ୟନ୍ତ 2.10 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii /module/TabelaArredondamento/edit keessa kutaa Cadastrar tabela de arredondamento Page keessa. Dhugumatti jijjiirraa irratti raawwatame Nome gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-79 si geessa. Beekumsi kun yeroo 08/30/2025 ifoomsifameera kan ifoomsise Karina Gante (@KarinaGante) waliin CVE-Hunters. Odeeffannoon kun buufachuuf karinagante.github.io irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-9720 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana karinagante.github.io irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 ଆଡାପ୍ଟେସନ୍ · 110 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
08/30/2025 03:40 PM
ଅଦ୍ୟତନ 1/4
08/31/2025 10:46 AM
ଅଦ୍ୟତନ 2/4
08/31/2025 10:53 AM
ଅଦ୍ୟତନ 3/4
09/04/2025 02:40 AM
ଅଦ୍ୟତନ 4/4
10/13/2025 10:34 PM
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorPortabilisPortabilisPortabilisPortabilisPortabilis
software_namei-Educari-Educari-Educari-Educari-Educar
software_version<=2.10<=2.10<=2.10<=2.10<=2.10
software_componentCadastrar tabela de arredondamento PageCadastrar tabela de arredondamento PageCadastrar tabela de arredondamento PageCadastrar tabela de arredondamento PageCadastrar tabela de arredondamento Page
software_file/module/TabelaArredondamento/edit/module/TabelaArredondamento/edit/module/TabelaArredondamento/edit/module/TabelaArredondamento/edit/module/TabelaArredondamento/edit
software_argumentNomeNomeNomeNomeNome
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://karinagante.github.io/cve-2025-9720/
person_nameKarina GanteKarina GanteKarina GanteKarina GanteKarina Gante
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/15.mdhttps://karinagante.github.io/cve-2025-9720/#poc
source_cveCVE-2025-9720CVE-2025-9720CVE-2025-9720CVE-2025-9720CVE-2025-9720
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiPPPPP
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.23.2
cvss3_meta_basescore3.53.53.54.14.1
cvss3_meta_tempscore3.23.33.34.04.0
cvss4_vuldb_bscore5.15.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.02.0
advisory_date1756504800 (08/30/2025)1756504800 (08/30/2025)1756504800 (08/30/2025)1756504800 (08/30/2025)1756504800 (08/30/2025)
cve_nvd_summaryA vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from a remote location. The exploit is now public and may be used.A vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from a remote location. The exploit is now public and may be used.A vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from a remote location. The exploit is now public and may be used.A vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from a remote location. The exploit is now public and may be used.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiPPPP
cvss4_cna_vcNNNN
cvss4_cna_viLLLL
cvss4_cna_vaNNNN
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.15.15.15.1
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiRRRR
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore3.53.53.53.5
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore4444
euvd_idEUVD-2025-26287EUVD-2025-26287EUVD-2025-26287
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiRR
cvss3_nvd_sCC
cvss3_nvd_cLL
cvss3_nvd_iLL
cvss3_nvd_aNN
cvss3_nvd_basescore5.45.4
company_websitehttps://www.cvehunters.com/
company_websitehttps://www.cvehunters.com/
developer_nickname@KarinaGante
person_websitehttps://karinagante.github.io/
developer_nameKarina Gante
company_nameCVE-Hunters
company_nameCVE-Hunters
developer_websitehttps://karinagante.github.io/
person_nickname@KarinaGante

Do you want to use VulDB in your project?

Use the official API to access entries easily!