Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 19 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fabian
Fabian email Logging Interface |
|
| CPEs | cpe:2.3:a:fabian:email_logging_interface:2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Fabian
Fabian email Logging Interface |
Mon, 17 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects email Logging Interface |
|
| Vendors & Products |
Code-projects
Code-projects email Logging Interface |
Sat, 15 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used. | |
| Title | code-projects Email Logging Interface signup.cpp path traversal | |
| Weaknesses | CWE-23 CWE-24 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-17T18:54:33.761Z
Reserved: 2025-11-14T16:16:24.885Z
Link: CVE-2025-13199
Updated: 2025-11-17T18:54:29.806Z
Status : Analyzed
Published: 2025-11-15T11:15:55.110
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-13199
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:21Z