All the vulnerabilites related to code-projects - Inventory Management System
cve-2025-6665
Vulnerability from cvelistv5
Published
2025-06-25 20:31
Modified
2025-06-26 14:44
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System editBrand.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313879 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313879 | signature, permissions-required | |
https://vuldb.com/?submit.602324 | third-party-advisory | |
https://github.com/catfish258/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6665", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-26T14:44:26.608066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-26T14:44:34.396Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "aceknight (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /php_action/editBrand.php. The manipulation of the argument editBrandStatus leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /php_action/editBrand.php. Mittels dem Manipulieren des Arguments editBrandStatus mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T20:31:08.262Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313879 | code-projects Inventory Management System editBrand.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313879" }, { "name": "VDB-313879 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313879" }, { "name": "Submit #602324 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602324" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/catfish258/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-25T16:50:48.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System editBrand.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6665", "datePublished": "2025-06-25T20:31:08.262Z", "dateReserved": "2025-06-25T14:45:44.383Z", "dateUpdated": "2025-06-26T14:44:34.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6822
Vulnerability from cvelistv5
Published
2025-06-28 18:31
Modified
2025-06-28 18:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System removeProduct.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314260 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314260 | signature, permissions-required | |
https://vuldb.com/?submit.602641 | third-party-advisory | |
https://github.com/Dav1d-safe/cve/issues/2 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Dav1d (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /php_action/removeProduct.php. The manipulation of the argument productId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /php_action/removeProduct.php. Dank Manipulation des Arguments productId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T18:31:05.801Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314260 | code-projects Inventory Management System removeProduct.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314260" }, { "name": "VDB-314260 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314260" }, { "name": "Submit #602641 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602641" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Dav1d-safe/cve/issues/2" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:04:05.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System removeProduct.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6822", "datePublished": "2025-06-28T18:31:05.801Z", "dateReserved": "2025-06-27T16:58:49.668Z", "dateUpdated": "2025-06-28T18:31:05.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6501
Vulnerability from cvelistv5
Published
2025-06-23 03:00
Modified
2025-06-23 13:27
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System createCategories.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313617 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313617 | signature, permissions-required | |
https://vuldb.com/?submit.601251 | third-party-advisory | |
https://github.com/mex135605/cve/issues/2 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6501", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T13:27:47.331623Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T13:27:50.412Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/mex135605/cve/issues/2" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "mex135605 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Inventory Management System 1.0. This affects an unknown part of the file /php_action/createCategories.php. The manipulation of the argument categoriesStatus leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in code-projects Inventory Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /php_action/createCategories.php. Durch das Manipulieren des Arguments categoriesStatus mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T03:00:15.916Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313617 | code-projects Inventory Management System createCategories.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313617" }, { "name": "VDB-313617 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313617" }, { "name": "Submit #601251 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601251" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/mex135605/cve/issues/2" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-22T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-22T21:15:00.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System createCategories.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6501", "datePublished": "2025-06-23T03:00:15.916Z", "dateReserved": "2025-06-22T19:09:46.963Z", "dateUpdated": "2025-06-23T13:27:50.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6668
Vulnerability from cvelistv5
Published
2025-06-25 22:00
Modified
2025-06-26 13:33
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System fetchSelectedBrand.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313881 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313881 | signature, permissions-required | |
https://vuldb.com/?submit.602340 | third-party-advisory | |
https://github.com/lijingze-eng/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6668", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-26T13:33:29.063569Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-26T13:33:53.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "a9133065377 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /php_action/fetchSelectedBrand.php. The manipulation of the argument brandId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in code-projects Inventory Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /php_action/fetchSelectedBrand.php. Durch das Manipulieren des Arguments brandId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T22:00:17.561Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313881 | code-projects Inventory Management System fetchSelectedBrand.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313881" }, { "name": "VDB-313881 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313881" }, { "name": "Submit #602340 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602340" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/lijingze-eng/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-25T16:55:54.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System fetchSelectedBrand.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6668", "datePublished": "2025-06-25T22:00:17.561Z", "dateReserved": "2025-06-25T14:50:51.336Z", "dateUpdated": "2025-06-26T13:33:53.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6820
Vulnerability from cvelistv5
Published
2025-06-28 17:31
Modified
2025-06-28 17:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System createProduct.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314258 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314258 | signature, permissions-required | |
https://vuldb.com/?submit.602617 | third-party-advisory | |
https://github.com/AlbaDove/cve/issues/3 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "AlbaDove (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /php_action/createProduct.php. The manipulation of the argument productName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in code-projects Inventory Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /php_action/createProduct.php. Durch Beeinflussen des Arguments productName mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T17:31:05.378Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314258 | code-projects Inventory Management System createProduct.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314258" }, { "name": "VDB-314258 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314258" }, { "name": "Submit #602617 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602617" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/AlbaDove/cve/issues/3" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:04:01.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System createProduct.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6820", "datePublished": "2025-06-28T17:31:05.378Z", "dateReserved": "2025-06-27T16:58:44.212Z", "dateUpdated": "2025-06-28T17:31:05.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6474
Vulnerability from cvelistv5
Published
2025-06-22 11:31
Modified
2025-06-23 14:10
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System changeUsername.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313582 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313582 | signature, permissions-required | |
https://vuldb.com/?submit.600494 | third-party-advisory | |
https://github.com/1609624781/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6474", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T14:07:31.341972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T14:10:06.491Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "hex314 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeUsername.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine kritische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Datei /changeUsername.php. Mittels dem Manipulieren des Arguments user_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-22T11:31:06.073Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313582 | code-projects Inventory Management System changeUsername.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313582" }, { "name": "VDB-313582 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313582" }, { "name": "Submit #600494 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.600494" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/1609624781/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-21T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-21T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-21T07:34:09.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System changeUsername.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6474", "datePublished": "2025-06-22T11:31:06.073Z", "dateReserved": "2025-06-21T05:29:06.467Z", "dateUpdated": "2025-06-23T14:10:06.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6821
Vulnerability from cvelistv5
Published
2025-06-28 18:00
Modified
2025-06-28 18:00
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System createOrder.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314259 | vdb-entry | |
https://vuldb.com/?ctiid.314259 | signature, permissions-required | |
https://vuldb.com/?submit.602640 | third-party-advisory | |
https://github.com/Dav1d-safe/cve/issues/3 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Dav1d (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /php_action/createOrder.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in code-projects Inventory Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /php_action/createOrder.php. Dank der Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T18:00:13.459Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314259 | code-projects Inventory Management System createOrder.php sql injection", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.314259" }, { "name": "VDB-314259 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314259" }, { "name": "Submit #602640 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602640" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Dav1d-safe/cve/issues/3" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:04:04.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System createOrder.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6821", "datePublished": "2025-06-28T18:00:13.459Z", "dateReserved": "2025-06-27T16:58:46.970Z", "dateUpdated": "2025-06-28T18:00:13.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6823
Vulnerability from cvelistv5
Published
2025-06-28 19:31
Modified
2025-06-28 19:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System editProduct.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314261 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314261 | signature, permissions-required | |
https://vuldb.com/?submit.602642 | third-party-advisory | |
https://github.com/Dav1d-safe/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Dav1d (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /php_action/editProduct.php. The manipulation of the argument editProductName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in code-projects Inventory Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /php_action/editProduct.php. Mit der Manipulation des Arguments editProductName mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T19:31:06.419Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314261 | code-projects Inventory Management System editProduct.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314261" }, { "name": "VDB-314261 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314261" }, { "name": "Submit #602642 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602642" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Dav1d-safe/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:04:06.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System editProduct.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6823", "datePublished": "2025-06-28T19:31:06.419Z", "dateReserved": "2025-06-27T16:58:52.407Z", "dateUpdated": "2025-06-28T19:31:06.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6834
Vulnerability from cvelistv5
Published
2025-06-28 23:31
Modified
2025-06-28 23:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System editPayment.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314278 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314278 | signature, permissions-required | |
https://vuldb.com/?submit.603127 | third-party-advisory | |
https://vuldb.com/?submit.603855 | third-party-advisory | |
https://github.com/xiaoqitc/cve-/issues/5 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "xiaobai520 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /php_action/editPayment.php. The manipulation of the argument orderId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /php_action/editPayment.php. Durch Manipulieren des Arguments orderId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T23:31:05.813Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314278 | code-projects Inventory Management System editPayment.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314278" }, { "name": "VDB-314278 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314278" }, { "name": "Submit #603127 | code-projects Inventory Management System v1.0 SQL Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.603127" }, { "name": "Submit #603855 | code-projects Inventory Management System V1.0 SQL injection (Duplicate)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.603855" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/xiaoqitc/cve-/issues/5" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T20:37:11.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System editPayment.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6834", "datePublished": "2025-06-28T23:31:05.813Z", "dateReserved": "2025-06-27T18:32:08.671Z", "dateUpdated": "2025-06-28T23:31:05.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6502
Vulnerability from cvelistv5
Published
2025-06-23 03:31
Modified
2025-06-23 12:54
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System changePassword.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313618 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313618 | signature, permissions-required | |
https://vuldb.com/?submit.601252 | third-party-advisory | |
https://github.com/mex135605/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6502", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T12:54:21.987072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T12:54:37.053Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "mex135605 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /php_action/changePassword.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /php_action/changePassword.php. Durch Manipulieren des Arguments user_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T03:31:05.474Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313618 | code-projects Inventory Management System changePassword.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313618" }, { "name": "VDB-313618 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313618" }, { "name": "Submit #601252 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601252" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/mex135605/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-22T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-22T21:15:01.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System changePassword.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6502", "datePublished": "2025-06-23T03:31:05.474Z", "dateReserved": "2025-06-22T19:09:49.434Z", "dateUpdated": "2025-06-23T12:54:37.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6500
Vulnerability from cvelistv5
Published
2025-06-23 02:31
Modified
2025-06-23 13:28
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System editCategories.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313616 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313616 | signature, permissions-required | |
https://vuldb.com/?submit.601250 | third-party-advisory | |
https://github.com/mex135605/cve/issues/3 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6500", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T13:28:22.293414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T13:28:25.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/mex135605/cve/issues/3" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "mex135605 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Inventory Management System 1.0. Affected by this issue is some unknown functionality of the file /php_action/editCategories.php. The manipulation of the argument editCategoriesName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in code-projects Inventory Management System 1.0 entdeckt. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /php_action/editCategories.php. Mittels Manipulieren des Arguments editCategoriesName mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T02:31:06.887Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313616 | code-projects Inventory Management System editCategories.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313616" }, { "name": "VDB-313616 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313616" }, { "name": "Submit #601250 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601250" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/mex135605/cve/issues/3" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-22T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-22T21:14:58.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System editCategories.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6500", "datePublished": "2025-06-23T02:31:06.887Z", "dateReserved": "2025-06-22T19:09:44.416Z", "dateUpdated": "2025-06-23T13:28:25.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6827
Vulnerability from cvelistv5
Published
2025-06-28 22:00
Modified
2025-06-28 22:00
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System editOrder.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314265 | vdb-entry | |
https://vuldb.com/?ctiid.314265 | signature, permissions-required | |
https://vuldb.com/?submit.602999 | third-party-advisory | |
https://github.com/YunQipao/cve/issues/3 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Venus01 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Inventory Management System 1.0. This affects an unknown part of the file /php_action/editOrder.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in code-projects Inventory Management System 1.0 gefunden. Es betrifft eine unbekannte Funktion der Datei /php_action/editOrder.php. Mittels Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T22:00:16.543Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314265 | code-projects Inventory Management System editOrder.php sql injection", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.314265" }, { "name": "VDB-314265 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314265" }, { "name": "Submit #602999 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602999" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/YunQipao/cve/issues/3" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:08:38.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System editOrder.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6827", "datePublished": "2025-06-28T22:00:16.543Z", "dateReserved": "2025-06-27T17:03:35.647Z", "dateUpdated": "2025-06-28T22:00:16.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6819
Vulnerability from cvelistv5
Published
2025-06-28 16:31
Modified
2025-06-28 16:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System removeBrand.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314257 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314257 | signature, permissions-required | |
https://vuldb.com/?submit.602609 | third-party-advisory | |
https://github.com/AlbaDove/cve/issues/2 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "AlbaDove (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /php_action/removeBrand.php. The manipulation of the argument brandId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /php_action/removeBrand.php. Durch das Beeinflussen des Arguments brandId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T16:31:05.642Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314257 | code-projects Inventory Management System removeBrand.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314257" }, { "name": "VDB-314257 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314257" }, { "name": "Submit #602609 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.602609" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/AlbaDove/cve/issues/2" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:03:59.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System removeBrand.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6819", "datePublished": "2025-06-28T16:31:05.642Z", "dateReserved": "2025-06-27T16:58:41.362Z", "dateUpdated": "2025-06-28T16:31:05.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6612
Vulnerability from cvelistv5
Published
2025-06-25 15:31
Modified
2025-06-26 19:41
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System removeCategories.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313829 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313829 | signature, permissions-required | |
https://vuldb.com/?submit.601977 | third-party-advisory | |
https://github.com/Lwlej/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6612", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-26T19:41:31.834773Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-26T19:41:42.361Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "LWLW (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /php_action/removeCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in code-projects Inventory Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /php_action/removeCategories.php. Durch Beeinflussen des Arguments categoriesId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T15:31:07.817Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313829 | code-projects Inventory Management System removeCategories.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313829" }, { "name": "VDB-313829 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313829" }, { "name": "Submit #601977 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601977" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Lwlej/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-25T07:58:09.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System removeCategories.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6612", "datePublished": "2025-06-25T15:31:07.817Z", "dateReserved": "2025-06-25T05:53:02.545Z", "dateUpdated": "2025-06-26T19:41:42.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6503
Vulnerability from cvelistv5
Published
2025-06-23 04:00
Modified
2025-06-23 12:51
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System fetchSelectedCategories.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313619 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313619 | signature, permissions-required | |
https://vuldb.com/?submit.601286 | third-party-advisory | |
https://github.com/YunQipao/cve/issues/1 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6503", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T12:47:30.358074Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T12:51:38.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Venus01 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /php_action/fetchSelectedCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in code-projects Inventory Management System 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /php_action/fetchSelectedCategories.php. Durch das Beeinflussen des Arguments categoriesId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T04:00:16.529Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313619 | code-projects Inventory Management System fetchSelectedCategories.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313619" }, { "name": "VDB-313619 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313619" }, { "name": "Submit #601286 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601286" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/YunQipao/cve/issues/1" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-22T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-22T21:15:03.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System fetchSelectedCategories.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6503", "datePublished": "2025-06-23T04:00:16.529Z", "dateReserved": "2025-06-22T19:09:52.181Z", "dateUpdated": "2025-06-23T12:51:38.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6611
Vulnerability from cvelistv5
Published
2025-06-25 15:31
Modified
2025-06-26 19:38
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System createBrand.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313828 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313828 | signature, permissions-required | |
https://vuldb.com/?submit.601976 | third-party-advisory | |
https://github.com/Lwlej/cve/issues/2 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6611", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-26T19:38:33.715592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-26T19:38:45.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "LWLW (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /php_action/createBrand.php. The manipulation of the argument brandStatus leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /php_action/createBrand.php. Durch das Beeinflussen des Arguments brandStatus mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T15:31:05.727Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313828 | code-projects Inventory Management System createBrand.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313828" }, { "name": "VDB-313828 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313828" }, { "name": "Submit #601976 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.601976" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/Lwlej/cve/issues/2" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-25T07:58:07.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System createBrand.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6611", "datePublished": "2025-06-25T15:31:05.727Z", "dateReserved": "2025-06-25T05:52:59.388Z", "dateUpdated": "2025-06-26T19:38:45.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6828
Vulnerability from cvelistv5
Published
2025-06-28 22:31
Modified
2025-06-28 22:31
Severity ?
EPSS score ?
Summary
code-projects Inventory Management System orders.php sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314266 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314266 | signature, permissions-required | |
https://vuldb.com/?submit.603000 | third-party-advisory | |
https://github.com/YunQipao/cve/issues/2 | exploit, issue-tracking | |
https://code-projects.org/ | product |
Impacted products
▼ | Vendor | Product |
---|---|---|
code-projects | Inventory Management System |
{ "containers": { "cna": { "affected": [ { "product": "Inventory Management System", "vendor": "code-projects", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Venus01 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /orders.php. The manipulation of the argument i leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In code-projects Inventory Management System 1.0 wurde eine kritische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /orders.php. Durch das Manipulieren des Arguments i mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-28T22:31:05.926Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314266 | code-projects Inventory Management System orders.php sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314266" }, { "name": "VDB-314266 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314266" }, { "name": "Submit #603000 | code-projects Inventory Management System V1.0 SQL injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.603000" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/YunQipao/cve/issues/2" }, { "tags": [ "product" ], "url": "https://code-projects.org/" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T19:09:02.000Z", "value": "VulDB entry last update" } ], "title": "code-projects Inventory Management System orders.php sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6828", "datePublished": "2025-06-28T22:31:05.926Z", "dateReserved": "2025-06-27T17:03:55.998Z", "dateUpdated": "2025-06-28T22:31:05.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }