A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability affects unknown code of the file /superstore/admin/sales.php. The manipulation of the argument ssalescat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/lan041221/cvec/issues/3 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.319894 | Permissions Required |
https://vuldb.com/?id.319894 | Third Party Advisory VDB Entry |
https://1000projects.org/ | Product |
https://vuldb.com/?submit.631703 | Exploit Third Party Advisory VDB Entry |
https://github.com/lan041221/cvec/issues/3 | Exploit Third Party Advisory |
https://vuldb.com/?submit.631703 | Exploit Third Party Advisory VDB Entry |
Configurations
History
15 Aug 2025, 16:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lan041221/cvec/issues/3 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?id.319894 - Third Party Advisory, VDB Entry | |
References | () https://1000projects.org/ - Product | |
References | () https://vuldb.com/?ctiid.319894 - Permissions Required | |
References | () https://vuldb.com/?submit.631703 - Exploit, Third Party Advisory, VDB Entry | |
First Time |
1000projects sales Management System
1000projects |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:* |
14 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuldb.com/?submit.631703 - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
14 Aug 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-14 03:15
Updated : 2025-08-15 16:35
NVD link : CVE-2025-8932
Mitre link : CVE-2025-8932
JSON object : View
Products Affected
1000projects
- sales_management_system
CWE
No CWE.