Total
14188 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-46502 | 1 Online Student Enrollment System Project | 1 Online Student Enrollment System | 2025-04-07 | N/A | 9.8 CRITICAL |
Online Student Enrollment System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at /student_enrollment/admin/login.php. | |||||
CVE-2025-0298 | 1 Code-projects | 1 Online Book Shop | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability was found in code-projects Online Book Shop 1.0. It has been rated as critical. This issue affects some unknown processing of the file /process_login.php. The manipulation of the argument usernm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-0299 | 1 Code-projects | 1 Online Book Shop | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3265 | 1 Phpgurukul | 1 E-diary Management System | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical was found in PHPGurukul e-Diary Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add-category.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3267 | 1 Qinguoyi | 1 Tinywebserver | 2025-04-07 | N/A | 8.8 HIGH |
A vulnerability, which was classified as critical, was found in qinguoyi TinyWebServer up to 1.0. This affects an unknown part of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3330 | 1 Code-projects | 1 Online Restaurant Management System | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. This vulnerability affects unknown code of the file /reservation_save.php. The manipulation of the argument first leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | |||||
CVE-2025-3331 | 1 Code-projects | 1 Online Restaurant Management System | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. This issue affects some unknown processing of the file /payment_save.php. The manipulation of the argument mode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3332 | 1 Code-projects | 1 Online Restaurant Management System | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability, which was classified as critical, was found in codeprojects Online Restaurant Management System 1.0. Affected is an unknown function of the file /admin/menu_save.php. The manipulation of the argument menu leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2022-46952 | 1 Dynamic Transaction Queuing System Project | 1 Dynamic Transaction Queuing System | 2025-04-07 | N/A | 7.2 HIGH |
Dynamic Transaction Queuing System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/ajax.php?action=delete_user. | |||||
CVE-2022-46951 | 1 Dynamic Transaction Queuing System Project | 1 Dynamic Transaction Queuing System | 2025-04-07 | N/A | 7.2 HIGH |
Dynamic Transaction Queuing System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/ajax.php?action=delete_uploads. | |||||
CVE-2024-12490 | 1 Code-projects | 1 Online Class And Exam Scheduling System | 2025-04-07 | N/A | 9.8 CRITICAL |
A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /pages/teacher_save.php. The manipulation of the argument salut leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | |||||
CVE-2024-0399 | 1 Vanquish | 1 Woocommerce Customers Manager | 2025-04-07 | N/A | N/A |
The WooCommerce Customers Manager WordPress plugin before 29.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to an SQL injection exploitable by Subscriber+ role. | |||||
CVE-2025-3018 | 1 Oretnom23 | 1 Online Eyewear Shop | 2025-04-07 | N/A | 7.5 HIGH |
A vulnerability, which was classified as critical, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Users.php?f=delete. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3369 | 2025-04-07 | N/A | 6.3 MEDIUM | ||
A vulnerability was found in xxyopen Novel-Plus 5.1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /novel/friendLink/list. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-1264 | 2025-04-06 | N/A | 6.5 MEDIUM | ||
The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to SQL Injection via the 'orderBy' parameter in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | |||||
CVE-2024-1833 | 1 Walterjnr1 | 1 Employee Management System | 2025-04-05 | N/A | 9.8 CRITICAL |
A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Account/login.php. The manipulation of the argument txtusername/txtphone leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-5276 | 1 Fortra | 1 Filecatalyst Workflow | 2025-04-04 | N/A | 9.1 CRITICAL |
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier. | |||||
CVE-2021-37497 | 1 Pbootcms | 1 Pbootcms | 2025-04-04 | N/A | 9.8 CRITICAL |
SQL injection vulnerability in route of PbootCMS 3.0.5 allows remote attackers to run arbitrary SQL commands via crafted GET request. | |||||
CVE-2023-36361 | 1 Web-audimex | 1 Audimexee | 2025-04-04 | N/A | 9.8 CRITICAL |
Audimexee v14.1.7 was discovered to contain a SQL injection vulnerability via the p_table_name parameter. | |||||
CVE-2022-4547 | 1 Thedotstore | 1 Conditional Payment Methods For Woocommerce | 2025-04-04 | N/A | 7.2 HIGH |
The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin. |