A vulnerability classified as critical has been found in 1000 Projects Daily College Class Work Report Book 1.0. Affected is an unknown function of the file /dcwr_entry.php. The manipulation of the argument Date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://1000projects.org/ | Product |
https://github.com/Jackie1732/CVE/issues/1 | Exploit Third Party Advisory |
https://github.com/Jackie1732/CVE/issues/1 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.310302 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.310302 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.582110 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
05 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
1000projects
1000projects daily College Class Work Report Book |
|
CWE | CWE-89 | |
CPE | cpe:2.3:a:1000projects:daily_college_class_work_report_book:1.0:*:*:*:*:*:*:* | |
References | () https://vuldb.com/?ctiid.310302 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://github.com/Jackie1732/CVE/issues/1 - Exploit, Third Party Advisory | |
References | () https://1000projects.org/ - Product | |
References | () https://vuldb.com/?id.310302 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.582110 - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
28 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
26 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-26 21:15
Updated : 2025-06-05 14:15
NVD link : CVE-2025-5205
Mitre link : CVE-2025-5205
JSON object : View
Products Affected
1000projects
- daily_college_class_work_report_book
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')