Browse all 4 CVE security advisories affecting nebojsadabic. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Nebojsadabic develops web applications and APIs primarily for enterprise clients, with a core focus on custom business solutions. Historically, vulnerabilities associated with this developer include remote code execution, cross-site scripting (XSS), and privilege escalation, often stemming from insufficient input validation and misconfigured access controls. While no major public security incidents have been documented, the four CVEs on record highlight recurring issues in secure coding practices. Security assessments indicate inconsistent implementation of authentication mechanisms and inadequate parameter sanitization, particularly in user-facing components. These patterns suggest a need for enhanced security testing protocols and developer training to mitigate common web application risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-8072 | Target Video Easy Publish <= 3.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via placeholder_img Parameter — Target Video Easy PublishCWE-79 | 6.4 | Medium | 2026-01-28 |
| CVE-2025-5237 | Target Video Easy Publish <= 3.8.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via width Parameter — Target Video Easy PublishCWE-79 | 6.4 | Medium | 2025-06-18 |
| CVE-2024-13561 | Target Video Easy Publish <= 3.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via brid_override_yt Shortcode — Target Video Easy PublishCWE-79 | 6.4 | Medium | 2025-01-29 |
| CVE-2024-12076 | Target Video Easy Publish <= 3.8.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting — Target Video Easy PublishCWE-79 | 6.1 | Medium | 2025-01-25 |
This page lists every published CVE security advisory associated with nebojsadabic. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.