Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codehub666
Codehub666 94list |
|
| Vendors & Products |
Codehub666
Codehub666 94list |
Wed, 19 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. | |
| Title | codehub666 94list function.php login sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-19T16:09:53.921Z
Reserved: 2025-11-19T06:53:21.869Z
Link: CVE-2025-13395
Updated: 2025-11-19T16:09:46.652Z
Status : Awaiting Analysis
Published: 2025-11-19T11:15:47.423
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-13395
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:35Z