From 7ba13e30b7ff664385c38611b9d2cc991c34df8d Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 3 Nov 2025 10:57:13 +0900 Subject: [PATCH] Update CVE-2025-6569.yaml --- http/cves/2025/CVE-2025-6569.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/http/cves/2025/CVE-2025-6569.yaml b/http/cves/2025/CVE-2025-6569.yaml index 8cce0a3ae63..8f74c858c6a 100644 --- a/http/cves/2025/CVE-2025-6569.yaml +++ b/http/cves/2025/CVE-2025-6569.yaml @@ -23,9 +23,6 @@ info: verified: true vendor: code-projects (School Fees Payment System) product: School Fees Payment System - vulnerable_file: /student.php - exploit_disclosed: true - notes: "Injection occurs when manipulating the 'ID' argument — validate/parameterize queries." tags: xss,cve,cve2025,code-projects,school-fees,unauth http: