{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:23:46.988","vulnerabilities":[{"cve":{"id":"CVE-2014-125031","sourceIdentifier":"cna@vuldb.com","published":"2023-01-02T08:15:09.583","lastModified":"2024-11-21T02:03:38.347","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability was found in kirill2485 TekNet. It has been classified as problematic. Affected is an unknown function of the file pages/loggedin.php. The manipulation of the argument statusentery leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 1c575340539f983333aa43fc58ecd76eb53e1816. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217176."},{"lang":"es","value":"Se encontró una vulnerabilidad en kirill2485 TekNet de Github. Ha sido clasificada como problemática. Una función desconocida del archivo pages/loggedin.php es afectada por esta vulnerabilidad. La manipulación del argumento statusentery conduce a cross-site scripting. Es posible lanzar el ataque de forma remota. El nombre del parche es 1c575340539f983333aa43fc58ecd76eb53e1816. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217176."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:teknet_project:teknet:-:*:*:*:*:*:*:*","matchCriteriaId":"E19EFBCF-78F8-417D-8135-A42E35468A82"}]}]}],"references":[{"url":"https://github.com/kirill2485/TekNet/commit/1c575340539f983333aa43fc58ecd76eb53e1816","source":"cna@vuldb.com","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.217176","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.217176","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/kirill2485/TekNet/commit/1c575340539f983333aa43fc58ecd76eb53e1816","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.217176","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.217176","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}