No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/ictrun/EBK-SA-2025-001 |
|
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mayswind:ezbookkeeping:*:*:*:*:*:*:*:* |
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mayswind
Mayswind ezbookkeeping |
|
| Vendors & Products |
Mayswind
Mayswind ezbookkeeping |
Wed, 18 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-674 | |
| Metrics |
cvssV3_1
|
Wed, 18 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-18T16:24:14.857Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65519
Updated: 2026-02-18T16:19:20.255Z
Status : Analyzed
Published: 2026-02-18T16:22:28.977
Modified: 2026-02-20T20:08:11.543
Link: CVE-2025-65519
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:20:44Z