{"vulnerability": "cve-2025-0197", "sightings": [{"uuid": "c5bb806f-c4de-48dd-87ef-42fbd09b4754", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0197", "type": "seen", "source": "https://t.me/cvedetector/14242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0197 - Code-projects Point of Sales and Inventory Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0197 \nPublished : Jan. 3, 2025, 8:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in code-projects Point of Sales and Inventory Management System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T22:02:19.000000Z"}, {"uuid": "95cf8d3d-ffb8-4050-bbfd-c18771b8546f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0197", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113766104409179276", "content": "", "creation_timestamp": "2025-01-03T19:36:30.337978Z"}, {"uuid": "de5f3b4f-7ce7-4d67-9005-e4db7588b6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0197", "type": "seen", "source": "MISP/dd71e3c5-20f7-409a-8bcc-8df3cd8022a7", "content": "", "creation_timestamp": "2025-09-03T13:30:06.000000Z"}]}