Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Gemini 2.5 Pro and Flash GA, GitHub Copilot Spaces, and more (June 20, 2025)

      June 20, 2025

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      CSS Cascade Layers Vs. BEM Vs. Utility Classes: Specificity Control

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025

      DistroWatch Weekly, Issue 1127

      June 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025
      Recent

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025

      Understanding JavaScript Promise

      June 22, 2025

      Lakeflow: Revolutionizing SCD2 Pipelines with Change Data Capture (CDC)

      June 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025
      Recent

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-6479 – Simple Pizza Ordering System SQL Injection

    CVE-2025-6479 – Simple Pizza Ordering System SQL Injection

    June 22, 2025

    CVE ID : CVE-2025-6479

    Published : June 22, 2025, 2:15 p.m. | 10 hours, 39 minutes ago

    Description : A vulnerability classified as critical has been found in code-projects Simple Pizza Ordering System 1.0. This affects an unknown part of the file /salesreport.php. The manipulation of the argument dayfrom leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6480 – Apache Code-Projects Simple Pizza Ordering System SQL Injection Vulnerability
    Next Article CVE-2025-6478 – CodeAstro Expense Management System CSRF

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6478 – CodeAstro Expense Management System CSRF

    June 22, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6480 – Apache Code-Projects Simple Pizza Ordering System SQL Injection Vulnerability

    June 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Community News: Latest PECL Releases (06.03.2025)

    Development

    CVE-2025-1054 – UiCore Elements – WordPress Stored Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    New UX/UI Tools I’m Loving! – Microsoft UX Certificate, Figma Updates, OpenAI Academy & Mor

    Web Development

    CVE-2025-2826 – Arista EOS Ingress ACL Enforcement Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2024-58098 – Linux Kernel BPF Packet Pointer Invalidation Vulnerability

    May 5, 2025

    CVE ID : CVE-2024-58098

    Published : May 5, 2025, 3:15 p.m. | 18 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    bpf: track changes_pkt_data property for global functions

    When processing calls to certain helpers, verifier invalidates all
    packet pointers in a current state. For example, consider the
    following program:

    __attribute__((__noinline__))
    long skb_pull_data(struct __sk_buff *sk, __u32 len)
    {
    return bpf_skb_pull_data(sk, len);
    }

    SEC(“tc”)
    int test_invalidate_checks(struct __sk_buff *sk)
    {
    int *p = (void *)(long)sk->data;
    if ((void *)(p + 1) > (void *)(long)sk->data_end) return TCX_DROP;
    skb_pull_data(sk, 0);
    *p = 42;
    return TCX_PASS;
    }

    After a call to bpf_skb_pull_data() the pointer ‘p’ can’t be used
    safely. See function filter.c:bpf_helper_changes_pkt_data() for a list
    of such helpers.

    At the moment verifier invalidates packet pointers when processing
    helper function calls, and does not traverse global sub-programs when
    processing calls to global sub-programs. This means that calls to
    helpers done from global sub-programs do not invalidate pointers in
    the caller state. E.g. the program above is unsafe, but is not
    rejected by verifier.

    This commit fixes the omission by computing field
    bpf_subprog_info->changes_pkt_data for each sub-program before main
    verification pass.
    changes_pkt_data should be set if:
    – subprogram calls helper for which bpf_helper_changes_pkt_data
    returns true;
    – subprogram calls a global function,
    for which bpf_subprog_info->changes_pkt_data should be set.

    The verifier.c:check_cfg() pass is modified to compute this
    information. The commit relies on depth first instruction traversal
    done by check_cfg() and absence of recursive function calls:
    – check_cfg() would eventually visit every call to subprogram S in a
    state when S is fully explored;
    – when S is fully explored:
    – every direct helper call within S is explored
    (and thus changes_pkt_data is set if needed);
    – every call to subprogram S1 called by S was visited with S1 fully
    explored (and thus S inherits changes_pkt_data from S1).

    The downside of such approach is that dead code elimination is not
    taken into account: if a helper call inside global function is dead
    because of current configuration, verifier would conservatively assume
    that the call occurs for the purpose of the changes_pkt_data
    computation.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-40572 – Siemens SCALANCE LPE9403 Privilege Escalation

    May 13, 2025

    APPLE-SA-04-16-2025-4 visionOS 2.4.1

    April 24, 2025

    Microsoft to Begin Phasing Out Legacy Drivers From Windows Update for Security and Stability

    June 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.