code-projects Laundry System 1.0 /data/edit_laundry.php Kunde Cross Site Scripting

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin code-projects Laundry System 1.0. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /data/edit_laundry.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument Kunde shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi 06/06/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-5765. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 Goyarwa · 97 Datenpunkte

FurɗeSúgá
06/06/2025 00:10
Gargadi 1/1
06/11/2025 08:08
software_vendorcode-projectscode-projects
software_nameLaundry SystemLaundry System
software_version1.01.0
software_file/data/edit_laundry.php/data/edit_laundry.php
software_argumentcustomercustomer
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiRR
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iLL
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/tuooo/CVE/issues/6https://github.com/tuooo/CVE/issues/6
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/tuooo/CVE/issues/6https://github.com/tuooo/CVE/issues/6
source_cveCVE-2025-5765CVE-2025-5765
cna_responsibleVulDBVulDB
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciNN
cvss2_vuldb_iiPP
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiPP
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore4.04.0
cvss2_vuldb_tempscore3.43.4
cvss3_vuldb_basescore3.53.5
cvss3_vuldb_tempscore3.23.2
cvss3_meta_basescore3.54.1
cvss3_meta_tempscore3.24.0
cvss4_vuldb_bscore5.15.1
cvss4_vuldb_btscore2.02.0
advisory_date1749160800 (06/06/2025)1749160800 (06/06/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in code-projects Laundry System 1.0. It has been classified as problematic. This affects an unknown part of the file /data/edit_laundry.php. The manipulation of the argument Customer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe encontró una vulnerabilidad en code-projects Laundry System 1.0. Se ha clasificado como problemática. Afecta a una parte desconocida del archivo /data/edit_laundry.php. La manipulación del argumento "Customer" provoca ataques de Cross Site Scripting. Es posible iniciar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiP
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.1
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cvss3_cna_basescore3.5
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciN
cvss2_cna_iiP
cvss2_cna_aiN
cvss2_cna_basescore4

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!