Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in code-projects Question Paper Generator 1.0. This affects an unknown part of the file /signupscript.php of the component POST Parameter Handler. Executing manipulation of the argument Fname can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. | |
| Title | code-projects Question Paper Generator POST Parameter signupscript.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-24T21:35:00.789Z
Reserved: 2025-11-23T09:49:50.873Z
Link: CVE-2025-13583
Updated: 2025-11-24T21:34:55.943Z
Status : Awaiting Analysis
Published: 2025-11-24T05:15:58.580
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-13583
No data.
OpenCVE Enrichment
No data.