Metrics
Affected Vendors & Products
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getmaxun
Getmaxun maxun |
|
| Vendors & Products |
Getmaxun
Getmaxun maxun |
Mon, 29 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 27 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | getmaxun Authentication Endpoint auth.ts router.get improper authorization | |
| Weaknesses | CWE-266 CWE-285 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-29T15:56:17.889Z
Reserved: 2025-12-26T18:10:58.997Z
Link: CVE-2025-15106
Updated: 2025-12-29T15:56:13.212Z
Status : Awaiting Analysis
Published: 2025-12-27T11:15:51.550
Modified: 2025-12-29T15:57:37.560
Link: CVE-2025-15106
No data.