[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2019-25709":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-12T20:13:20.293Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":27,"aliases":42,"duplicate_of":9,"upstream":43,"downstream":44,"duplicates":45,"related":46,"reserved_at":9,"published_at":47,"modified_at":47,"state":48,"summary":49,"references_raw":55,"kevs":75,"epss":9,"epss_history":76,"metrics":77,"affected":89},"CVE-2019-25709","CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database and use them to delete all pictures via the d parameter.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-552","Files or Directories Accessible to External Parties","The product makes files or directories accessible to unauthorized actors, even though they should not be.","weakness","Draft","Base",[19,23],{"id":20,"name":21,"techniques":22},"CAPEC-150","Collect Data from Common Resource Locations",[],{"id":24,"name":25,"techniques":26},"CAPEC-639","Probe System Files",[],[28],{"_key":29,"name":30,"source":31,"url":32,"maturity":33,"reliability_score":34,"verified":35,"type":9,"platforms":36,"requires_auth":9,"exploitdb":38,"metasploit":9},"46094","CF Image Hosting Script 1.6.5 - (Delete all Pictures) Privilege Escalation","exploit-database","https://www.exploit-db.com/exploits/46094","poc",0.5,false,[37],"php",{"verified":35,"type":39,"platform":37,"file":40,"codes":41},"webapps","exploits/php/webapps/46094.py",[],[],[],[],[],[],"2026-04-12T12:28:54.207Z","Received",{"cisa_kev":35,"cisa_ransomware":35,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":48},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[56,61,66,70],{"url":32,"sources":57,"tags":59},[53,58],"nvd",[60],"Exploit",{"url":62,"sources":63,"tags":64},"https://davidtavarez.github.io/",[53,58],[65],"Product",{"url":67,"sources":68,"tags":69},"http://forum.codefuture.co.uk/showthread.php?tid=73141",[53,58],[65],{"url":71,"sources":72,"tags":73},"https://www.vulncheck.com/advisories/cf-image-hosting-script-unauthorized-database-access",[53,58],[74],"Third Party Advisory",[],[],[78,85],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":79,"cvss_v4_0":82},{"baseScore":51,"baseSeverity":80,"vectorString":54,"impactScore":51,"exploitabilityScore":81},"CRITICAL",10,{"baseScore":83,"baseSeverity":80,"vectorString":84,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":58,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":86,"cvss_v4_0":87},{"baseScore":51,"baseSeverity":80,"vectorString":54,"impactScore":51,"exploitabilityScore":81},{"baseScore":83,"baseSeverity":80,"vectorString":88,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[90],{"ecosystem":9,"name":91,"vendor":92,"product":93,"cpe_part":94,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":95},"CF Image Hosting Script","davidtavarez","cf image hosting script","a",[96],{"version":97,"is_range":35,"range_type":53,"version_start":97,"version_start_type":98,"version_end":97,"version_end_type":98,"fixed_in":9},"1.6.5","including"]