Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 19 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Magicbug
Magicbug cloudlog |
|
| CPEs | cpe:2.3:a:magicbug:cloudlog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Magicbug
Magicbug cloudlog |
Sun, 16 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 15 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudlog
Cloudlog cloudlog |
|
| Vendors & Products |
Cloudlog
Cloudlog cloudlog |
Fri, 14 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Fri, 14 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-16T21:03:47.185Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64084
Updated: 2025-11-14T21:33:49.053Z
Status : Analyzed
Published: 2025-11-14T21:15:45.367
Modified: 2025-11-19T18:50:31.280
Link: CVE-2025-64084
No data.
OpenCVE Enrichment
Updated: 2025-11-15T21:25:23Z