Project Worlds Student Project Allocation System 1.0 forgot_password_sql.php Pat_BloodGroup1 SQL Injection
Gaskiya vulnerability da aka ware a matsayin kura an samu a Project Worlds Student Project Allocation System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /change_pass/forgot_password_sql.php, a cikin sashen $software_component. A sa manipulation of the argument Pat_BloodGroup1 ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 05/09/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-4482. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
1 Goyarwa · 57 Datenpunkte
| Furɗe | Súgá 05/09/2025 13:51 |
|---|---|
| cvss4_vuldb_vc | L |
| cvss4_vuldb_vi | L |
| cvss4_vuldb_va | L |
| cvss4_vuldb_e | P |
| cvss2_vuldb_rl | ND |
| cvss3_vuldb_rl | X |
| cvss4_vuldb_at | N |
| cvss4_vuldb_sc | N |
| cvss4_vuldb_si | N |
| cvss4_vuldb_sa | N |
| cvss2_vuldb_basescore | 7.5 |
| cvss2_vuldb_tempscore | 6.4 |
| cvss3_vuldb_basescore | 7.3 |
| cvss3_vuldb_tempscore | 6.6 |
| cvss3_meta_basescore | 7.3 |
| cvss3_meta_tempscore | 6.6 |
| cvss4_vuldb_bscore | 6.9 |
| cvss4_vuldb_btscore | 5.5 |
| advisory_date | 1746741600 (05/09/2025) |
| price_0day | $0-$5k |
| software_vendor | Project Worlds |
| software_name | Student Project Allocation System |
| software_version | 1.0 |
| software_file | /change_pass/forgot_password_sql.php |
| software_argument | Pat_BloodGroup1 |
| vulnerability_cwe | CWE-89 (SQL Injection) |
| vulnerability_risk | 2 |
| cvss3_vuldb_av | N |
| cvss3_vuldb_ac | L |
| cvss3_vuldb_pr | N |
| cvss3_vuldb_ui | N |
| cvss3_vuldb_s | U |
| cvss3_vuldb_c | L |
| cvss3_vuldb_i | L |
| cvss3_vuldb_a | L |
| cvss3_vuldb_e | P |
| cvss3_vuldb_rc | R |
| advisory_url | https://github.com/hhhanxx/attack/issues/3 |
| exploit_availability | 1 |
| exploit_publicity | 1 |
| exploit_url | https://github.com/hhhanxx/attack/issues/3 |
| source_cve | CVE-2025-4482 |
| cna_responsible | VulDB |
| decision_summary | Other parameters might be affected as well. |
| software_type | Project Management Software |
| cvss2_vuldb_av | N |
| cvss2_vuldb_ac | L |
| cvss2_vuldb_au | N |
| cvss2_vuldb_ci | P |
| cvss2_vuldb_ii | P |
| cvss2_vuldb_ai | P |
| cvss2_vuldb_e | POC |
| cvss2_vuldb_rc | UR |
| cvss4_vuldb_av | N |
| cvss4_vuldb_ac | L |
| cvss4_vuldb_pr | N |
| cvss4_vuldb_ui | N |