Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:docsys_project:docsys:*:*:*:*:*:*:*:* |
Thu, 23 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Docsys Project
Docsys Project docsys |
|
| Vendors & Products |
Docsys Project
Docsys Project docsys |
Fri, 17 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 12 Oct 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in RainyGao DocSys up to 2.02.36. Affected is the function updateRealDoc of the file /Doc/uploadDoc.do of the component File Upload. Performing manipulation of the argument path results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | RainyGao DocSys File Upload uploadDoc.do updateRealDoc path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-17T14:34:15.741Z
Reserved: 2025-10-11T13:51:10.924Z
Link: CVE-2025-11630
Updated: 2025-10-17T14:34:06.779Z
Status : Analyzed
Published: 2025-10-12T08:15:38.980
Modified: 2025-10-30T19:47:52.547
Link: CVE-2025-11630
No data.
OpenCVE Enrichment
Updated: 2025-10-23T15:17:37Z