Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1760 | A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Fri, 28 Feb 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anisha
Anisha fantasy-cricket |
|
| CPEs | cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Anisha
Anisha fantasy-cricket |
Tue, 21 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 19 Jan 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | code-projects Fantasy-Cricket update.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-01-21T20:30:40.942Z
Reserved: 2025-01-18T07:40:54.987Z
Link: CVE-2025-0563
Updated: 2025-01-21T20:30:06.332Z
Status : Analyzed
Published: 2025-01-19T02:15:24.560
Modified: 2025-02-28T02:02:26.513
Link: CVE-2025-0563
No data.
OpenCVE Enrichment
No data.
EUVD