No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file sendMessage.php. The manipulation of the argument type/length/business parameter validity results in sql injection. The attack may be launched remotely. The exploit is now public and may be used. | |
| Title | code-projects Simple Chat System sendMessage.php sql injection | |
| First Time appeared |
Code-projects
Code-projects simple Chat System |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:code-projects:simple_chat_system:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Code-projects
Code-projects simple Chat System |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-08T01:30:10.489Z
Reserved: 2026-05-07T17:09:04.622Z
Link: CVE-2026-8125
No data.
Status : Deferred
Published: 2026-05-08T02:16:08.200
Modified: 2026-05-08T15:45:49.503
Link: CVE-2026-8125
No data.
OpenCVE Enrichment
Updated: 2026-05-08T03:00:09Z