Metrics
Affected Vendors & Products
Fri, 14 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesiddhant
Codesiddhant jasmin-ransomware |
|
| CPEs | cpe:2.3:a:codesiddhant:jasmin-ransomware:1.0.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Codesiddhant
Codesiddhant jasmin-ransomware |
Mon, 16 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 15 Jun 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in codesiddhant Jasmin Ransomware 1.0.1. Affected is an unknown function of the file /checklogin.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | codesiddhant Jasmin Ransomware checklogin.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-16T16:27:55.956Z
Reserved: 2025-06-15T06:52:21.205Z
Link: CVE-2025-6095
Updated: 2025-06-16T16:27:51.214Z
Status : Analyzed
Published: 2025-06-15T23:15:18.680
Modified: 2025-11-14T16:43:58.647
Link: CVE-2025-6095
No data.