Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 19 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Magicbug
Magicbug cloudlog |
|
| CPEs | cpe:2.3:a:magicbug:cloudlog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Magicbug
Magicbug cloudlog |
Sun, 16 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 15 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudlog
Cloudlog cloudlog |
|
| Vendors & Products |
Cloudlog
Cloudlog cloudlog |
Fri, 14 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Fri, 14 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-16T21:03:47.185Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64084
Updated: 2025-11-14T21:33:49.053Z
Status : Analyzed
Published: 2025-11-14T21:15:45.367
Modified: 2025-11-19T18:50:31.280
Link: CVE-2025-64084
No data.
OpenCVE Enrichment
Updated: 2025-11-15T21:25:23Z