{"vulnerability": "CVE-2025-1189", "sightings": [{"uuid": "a65cde70-01ed-42c1-a698-cf7af89e4d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11893", "type": "seen", "source": "https://gist.github.com/Darkcrai86/4593889814d251db438393bf00c051a9", "content": "", "creation_timestamp": "2025-10-26T17:10:57.000000Z"}, {"uuid": "d6ce34a5-8f4c-4c8f-80c1-9516df8139da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1189", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwxu7xrr2z", "content": "", "creation_timestamp": "2025-02-12T10:16:21.951608Z"}, {"uuid": "20fad0ab-dc2a-4373-b4f7-716574a19e28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11892", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5d74jsfm7r2", "content": "", "creation_timestamp": "2025-11-11T03:30:48.249763Z"}, {"uuid": "934ce82b-fad5-4e96-af4f-ee0d3ffb651b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11892", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5cygcs6jkr2", "content": "", "creation_timestamp": "2025-11-11T01:31:12.127135Z"}, {"uuid": "ab36a14f-ecd0-40db-b22a-89027b3f3613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11892", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5czwfdrzi2x", "content": "", "creation_timestamp": "2025-11-11T01:57:35.532398Z"}, {"uuid": "28374c2d-cecb-4240-984a-84e1b3e6749e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-11899", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m3em2ifzr52m", "content": "", "creation_timestamp": "2025-10-17T06:04:17.355119Z"}, {"uuid": "241e94ec-7fb6-4d37-8519-e8710ff86d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11893", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3z3vmcwy62m", "content": "", "creation_timestamp": "2025-10-25T09:41:07.904834Z"}, {"uuid": "c85b247a-1223-463a-b289-dce374d3df89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11897", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3zmxgd3pu23", "content": "", "creation_timestamp": "2025-10-25T14:46:22.198875Z"}, {"uuid": "0e13e0ba-901e-408e-a336-1162da021682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11892", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/github-security-advisory-av25-737", "content": "", "creation_timestamp": "2025-11-12T14:15:37.000000Z"}, {"uuid": "71c0ee7d-e386-4e03-9620-8247c84fa682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11890", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4rtihh26z2q", "content": "", "creation_timestamp": "2025-11-04T05:47:09.797801Z"}, {"uuid": "9e2a2bd4-bdc9-4dad-be0e-368cb6690e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11896", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mchp3g3auk2g", "content": "", "creation_timestamp": "2026-01-15T13:32:57.478476Z"}, {"uuid": "b1be370d-c6f6-46e1-ab6a-26b4ab24e5d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11896", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mchzj35o2s2g", "content": "", "creation_timestamp": "2026-01-15T16:39:32.437462Z"}, {"uuid": "0a2f6a30-b52d-412a-84b1-fe40bfc2caba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1189", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4059", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1189\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:14.540\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://1000projects.org/\n2. https://github.com/takakie/CVE/blob/main/cve_2.md\n3. https://vuldb.com/?ctiid.295095\n4. https://vuldb.com/?id.295095\n5. https://vuldb.com/?submit.496452", "creation_timestamp": "2025-02-12T11:07:43.000000Z"}, {"uuid": "0f1c12a0-a55c-492a-a660-662b810e9370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1189", "type": "seen", "source": "https://t.me/cvedetector/17835", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1189 - \"1000 Projects Attendance Tracking Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-1189 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in 1000 Projects Attendance Tracking Management System 1.0. This affects an unknown part of the file /admin/chart1.php. The manipulation of the argument course_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:36.000000Z"}, {"uuid": "240985f8-5d18-45db-8c7c-dffba3693c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1189", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4092", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1189\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in 1000 Projects Attendance Tracking Management System 1.0. This affects an unknown part of the file /admin/chart1.php. The manipulation of the argument course_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-02-12T12:30:47Z\n\ud83d\udccf Modified: 2025-02-12T12:30:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1189\n2. https://1000projects.org\n3. https://github.com/takakie/CVE/blob/main/cve_2.md\n4. https://vuldb.com/?ctiid.295095\n5. https://vuldb.com/?id.295095\n6. https://vuldb.com/?submit.496452", "creation_timestamp": "2025-02-12T13:11:21.000000Z"}, {"uuid": "a3bab482-3e75-45f5-b9d9-6a1c5b6d2812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1189", "type": "seen", "source": "Telegram/CmpnWWCXz-33k2V7M6Az3Wb_GHyMif83IXYq5QS-vg2pgryM", "content": "", "creation_timestamp": "2025-02-20T23:26:55.000000Z"}]}