Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Mon, 14 Jul 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd. Affected is the function Download of the file /download. The manipulation of the argument url leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | |
Title | YiJiuSmile kkFileViewOfficeEdit download path traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-14T16:14:05.423Z
Updated: 2025-07-15T19:51:21.241Z
Reserved: 2025-07-14T07:46:44.996Z
Link: CVE-2025-7625

Updated: 2025-07-14T16:42:23.964Z

Status : Awaiting Analysis
Published: 2025-07-14T17:15:39.017
Modified: 2025-07-15T20:16:00.813
Link: CVE-2025-7625

No data.