Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gurkanuzunca
Gurkanuzunca newsbull |
|
| CPEs | cpe:2.3:a:gurkanuzunca:newsbull:1.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Gurkanuzunca
Gurkanuzunca newsbull |
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Newsbull
Newsbull newsbull Haber Script |
|
| Vendors & Products |
Newsbull
Newsbull newsbull Haber Script |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data. | |
| Title | Newsbull Haber Script 1.0.0 Authenticated SQL Injection via search parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T18:06:18.270Z
Reserved: 2026-04-05T15:36:33.509Z
Link: CVE-2019-25699
Updated: 2026-04-13T17:58:09.779Z
Status : Analyzed
Published: 2026-04-12T13:16:32.770
Modified: 2026-04-17T16:43:44.013
Link: CVE-2019-25699
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:55:56Z