Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 24 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lanol
Lanol filecodebox |
|
| CPEs | cpe:2.3:a:lanol:filecodebox:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lanol
Lanol filecodebox |
Fri, 21 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filecodebox
Filecodebox filecodebox |
|
| Vendors & Products |
Filecodebox
Filecodebox filecodebox |
Thu, 20 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-305 | |
| Metrics |
cvssV3_1
|
Wed, 19 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-20T21:08:20.134Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51663
Updated: 2025-11-20T21:08:16.307Z
Status : Analyzed
Published: 2025-11-19T20:15:53.203
Modified: 2025-11-24T19:29:36.303
Link: CVE-2025-51663
No data.
OpenCVE Enrichment
Updated: 2025-11-21T09:16:20Z