Verysync

2 CVEs product

Monthly

CVE-2025-14199 MEDIUM POC This Month

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Authentication Bypass Verysync
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-14198 MEDIUM POC This Month

A vulnerability was detected in Verysync 微力同步 2.21.3. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Information Disclosure Verysync
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-14199
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Authentication Bypass Verysync
NVD GitHub VulDB
CVE-2025-14198
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A vulnerability was detected in Verysync 微力同步 2.21.3. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Information Disclosure Verysync
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy