A weakness has been identified in SourceCodester Online Polling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/positions.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
References
Link | Resource |
---|---|
https://github.com/ganzhi-qcy/cve/issues/23 | Broken Link |
https://github.com/ganzhi-qcy/cve/issues/27 | Broken Link |
https://vuldb.com/?ctiid.324644 | Permissions Required VDB Entry |
https://vuldb.com/?id.324644 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.649948 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.649958 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
Configurations
History
20 Sep 2025, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ganzhi-qcy/cve/issues/23 - Broken Link | |
References | () https://github.com/ganzhi-qcy/cve/issues/27 - Broken Link | |
References | () https://vuldb.com/?ctiid.324644 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.324644 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.649948 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.649958 - Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/ - Product | |
First Time |
Razormist
Razormist online Polling System |
|
CPE | cpe:2.3:a:razormist:online_polling_system:1.0:*:*:*:*:*:*:* |
17 Sep 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-17 21:15
Updated : 2025-09-20 02:40
NVD link : CVE-2025-10617
Mitre link : CVE-2025-10617
CVE.ORG link : CVE-2025-10617
JSON object : View
Products Affected
razormist
- online_polling_system