{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:57:37.764","vulnerabilities":[{"cve":{"id":"CVE-2019-25092","sourceIdentifier":"cna@vuldb.com","published":"2022-12-28T09:15:07.910","lastModified":"2024-11-21T04:39:55.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry['ip'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955."},{"lang":"es","value":"Una vulnerabilidad fue encontrada en Nakiami Mellivora hasta 2.1.x y clasificada como problemática. La función print_user_ip_log del archivo include/layout/user.inc.php del componente Admin Panel es afectada por esta vulnerabilidad. La manipulación del argumento $entry['ip'] conduce a cross site scripting. El ataque se puede lanzar de forma remota. La actualización a la versión 2.2.0 puede solucionar este problema. El nombre del parche es e0b6965f8dde608a3d2621617c05695eb406cbb9. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216955."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mellivora_project:mellivora:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.0","matchCriteriaId":"78B0C491-17AD-47E1-94A0-F3207F746649"}]}]}],"references":[{"url":"https://github.com/Nakiami/mellivora/commit/e0b6965f8dde608a3d2621617c05695eb406cbb9","source":"cna@vuldb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Nakiami/mellivora/releases/tag/v2.2.0","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.216955","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.216955","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/Nakiami/mellivora/commit/e0b6965f8dde608a3d2621617c05695eb406cbb9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Nakiami/mellivora/releases/tag/v2.2.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.216955","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.216955","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}