Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the option parameter. Attackers can send POST requests to uyelik.php with crafted payloads in the option parameter to execute time-based SQL injection attacks and extract sensitive database information. | |
| Title | Jettweb PHP Hazir Haber Sitesi Scripti V1 SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-12T18:45:26.122Z
Reserved: 2026-03-12T13:52:56.915Z
Link: CVE-2019-25519
Updated: 2026-03-12T18:45:20.848Z
Status : Received
Published: 2026-03-12T16:16:04.800
Modified: 2026-03-12T16:16:04.800
Link: CVE-2019-25519
No data.
OpenCVE Enrichment
No data.