jimit105 Project-Online-Shopping-Website har 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64 Product Inventory /delete.php product_code SQL Injection

Hakika vulnerability da aka rarraba a matsayin kura an gano a jimit105 Project-Online-Shopping-Website har 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /delete.php, a cikin sashi Product Inventory Handler. Wuro manipulation of the argument product_code ga SQL Injection. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-89. Lalle, rauni an sanar da shi 10/11/2025. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-11628. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. Ana amfani da rolling release a wannan kayi domin ci gaba da isar da sabuntawa. Saboda haka, babu bayanan sigar da abin ya shafa ko sabunta sigar da ake da su. If you want to get best quality of vulnerability data, you may have to visit VulDB.

4 Goyarwa · 96 Datenpunkte

FurɗeSúgá
10/11/2025 15:47
Gargadi 1/3
10/12/2025 07:20
Gargadi 2/3
10/12/2025 08:19
Gargadi 3/3
10/13/2025 20:37
cvss4_vuldb_ePPPP
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore5.85.85.85.8
cvss2_vuldb_tempscore5.05.05.05.0
cvss3_vuldb_basescore4.74.74.74.7
cvss3_vuldb_tempscore4.34.34.34.3
cvss3_meta_basescore4.74.74.74.7
cvss3_meta_tempscore4.34.54.54.5
cvss4_vuldb_bscore5.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.0
advisory_date1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)1760133600 (10/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorjimit105jimit105jimit105jimit105
software_nameProject-Online-Shopping-WebsiteProject-Online-Shopping-WebsiteProject-Online-Shopping-WebsiteProject-Online-Shopping-Website
software_version<=7d892f442bd8a96dd242dbe2b9bd5ed641e13e64<=7d892f442bd8a96dd242dbe2b9bd5ed641e13e64<=7d892f442bd8a96dd242dbe2b9bd5ed641e13e64<=7d892f442bd8a96dd242dbe2b9bd5ed641e13e64
software_rollingrelease1111
software_componentProduct Inventory HandlerProduct Inventory HandlerProduct Inventory HandlerProduct Inventory Handler
software_file/delete.php/delete.php/delete.php/delete.php
software_argumentproduct_codeproduct_codeproduct_codeproduct_code
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk2222
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prHHHH
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docx
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docxhttps://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docx
source_cveCVE-2025-11628CVE-2025-11628CVE-2025-11628CVE-2025-11628
cna_responsibleVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
software_typeProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management Software
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auMMMM
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prHHHH
cvss4_vuldb_uiNNNN
cvss4_vuldb_vcLLLL
cvss4_vuldb_viLLLL
cvss4_vuldb_vaLLLL
cve_nvd_summaryA flaw has been found in jimit105 Project-Online-Shopping-Website up to 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. This affects an unknown function of the file /delete.php of the component Product Inventory Handler. This manipulation of the argument product_code causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in jimit105 Project-Online-Shopping-Website up to 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. This affects an unknown function of the file /delete.php of the component Product Inventory Handler. This manipulation of the argument product_code causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in jimit105 Project-Online-Shopping-Website up to 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. This affects an unknown function of the file /delete.php of the component Product Inventory Handler. This manipulation of the argument product_code causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNN
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prHHH
cvss4_cna_uiNNN
cvss4_cna_vcLLL
cvss4_cna_viLLL
cvss4_cna_vaLLL
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore5.15.15.1
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prHHH
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cLLL
cvss3_cna_iLLL
cvss3_cna_aLLL
cvss3_cna_basescore4.74.74.7
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auMMM
cvss2_cna_ciPPP
cvss2_cna_iiPPP
cvss2_cna_aiPPP
cvss2_cna_basescore5.85.85.8
euvd_idEUVD-2025-33883EUVD-2025-33883
cnnvd_idCNNVD-202510-1618
cnnvd_nameProject-Online-Shopping-Website SQL注入漏洞
cnnvd_hazardlevel3
cnnvd_create2025-10-13
cnnvd_publish2025-10-12
cnnvd_update2025-10-13

Interested in the pricing of exploits?

See the underground prices here!