Total
14188 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-33973 | 1 Janobe | 5 Credit Card, Debit Card Payment, Paypal and 2 more | 2024-08-08 | N/A | 7.5 HIGH |
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/report/attendance_print.php' parameter. | |||||
CVE-2024-34479 | 1 Oretnom23 | 1 Computer Laboratory Management System | 2024-08-08 | N/A | 9.8 CRITICAL |
SourceCodester Computer Laboratory Management System 1.0 allows classes/Master.php id SQL Injection. | |||||
CVE-2024-7279 | 1 Oretnom23 | 1 Lot Reservation Management System | 2024-08-08 | N/A | 9.8 CRITICAL |
A vulnerability was found in SourceCodester Lot Reservation Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273148. | |||||
CVE-2024-7280 | 1 Oretnom23 | 1 Lot Reservation Management System | 2024-08-08 | N/A | 9.8 CRITICAL |
A vulnerability was found in SourceCodester Lot Reservation Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/view_reserved.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273149 was assigned to this vulnerability. | |||||
CVE-2024-7281 | 1 Oretnom23 | 1 Lot Reservation Management System | 2024-08-08 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical has been found in SourceCodester Lot Reservation Management System 1.0. Affected is an unknown function of the file /admin/index.php?page=manage_lot. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273150 is the identifier assigned to this vulnerability. | |||||
CVE-2024-7282 | 1 Oretnom23 | 1 Lot Reservation Management System | 2024-08-08 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical was found in SourceCodester Lot Reservation Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/manage_model.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273151. | |||||
CVE-2024-7283 | 1 Oretnom23 | 1 Lot Reservation Management System | 2024-08-08 | N/A | 8.8 HIGH |
A vulnerability, which was classified as critical, has been found in SourceCodester Lot Reservation Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273152. | |||||
CVE-2005-4515 | 1 Lois Software | 1 Webdb | 2024-08-08 | 7.5 HIGH | N/A |
SQL injection vulnerability in WebDB 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified search parameters, possibly Search0. NOTE: the vendor has disputed this issue, saying that "WebDB is a generic online database system used by many of the clients of Lois Software. The flaw that was identified was some code that was added for a client to do some testing of his system and only certain safe commands were allowed. This code has now been removed and it is not now possible to use SQL queries as part of the query string. No installation or patch is required All clients use a common code library and have their own front end and databases and connections. So as soon as a change / upgrade / enhancement is made to the code, all users of the software begin to use the latest changes immediately." Since the issue appeared in a custom web site and no action is required on the part of customers, this issue should not be included in CVE | |||||
CVE-2005-4232 | 1 Jamit | 1 Jamit Job Board | 2024-08-08 | 7.5 HIGH | N/A |
SQL injection vulnerability in index.php in Jamit Job Board 2.4.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: the vendor has disputed this issue, saying "The vulnerability is without any basis and did not actually work." CVE has not verified either the vendor or researcher statements, but the original researcher is known to make frequent mistakes when reporting SQL injection | |||||
CVE-2005-3497 | 1 Phphandicapper | 1 Php Handicapper | 2024-08-08 | 7.5 HIGH | N/A |
SQL injection vulnerability in process_signup.php in PHP Handicapper allows remote attackers to execute arbitrary SQL commands via the serviceid parameter. NOTE: on 20060210, the vendor disputed this issue, saying "this is 100% false reporting, this is a slander campaign from a customer who had a vulnerability in his SERVER not the software." However, followup investigation strongly suggests that the original report is correct | |||||
CVE-2005-4495 | 1 Spiremedia | 1 Mx7 | 2024-08-08 | 7.5 HIGH | N/A |
SQL injection vulnerability in index.cfm in SpireMedia mx7 allows remote attackers to execute arbitrary SQL commands via the cid parameter. NOTE: the vendor has disputed this issue, stating "This information is incorrect, unproven, and potentially slanderous." However, CVE and OSVDB have both performed additional research that suggests that this might be path disclosure from invalid SQL syntax | |||||
CVE-2005-1487 | 1 Fishnet | 1 Fishcart | 2024-08-07 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in FishCart 3.1 allow remote attackers to execute arbitrary SQL commands via the (1) cartid parameter to upstnt.php or (2) psku parameter to display.php. NOTE: the vendor disputes this report, saying that they are forced SQL errors. The original researcher is known to be unreliable | |||||
CVE-2006-5840 | 1 Abarcar | 1 Abarcar Realty Portal | 2024-08-07 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in Abarcar Realty Portal allow remote attackers to execute arbitrary SQL commands via the (1) neid parameter to newsdetails.php, or the (2) slid parameter to slistl.php. NOTE: the cat vector is already covered by CVE-2006-2853. NOTE: the vendor has notified CVE that the current version only creates static pages, and that slistl.php/slid never existed in any version | |||||
CVE-2006-5957 | 1 Infinicart | 1 Infinicart | 2024-08-07 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in INFINICART allow remote attackers to execute arbitrary SQL commands via the (1) groupid parameter in (a) browse_group.asp, (2) productid parameter in (b) added_to_cart.asp, and (3) catid and (4) subid parameter in (c) browsesubcat.asp. NOTE: the vendor has disputed this report, saying "The vulnerabilities mentioned were never present in our official released products but only in the unofficial demo version. However we do appreciate the information. We have update our demo version and made sure all those vulnerabilities are fixed. | |||||
CVE-2024-7369 | 1 Oretnom23 | 1 Simple Realtime Quiz System | 2024-08-07 | N/A | 9.8 CRITICAL |
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability. | |||||
CVE-2024-7370 | 1 Oretnom23 | 1 Simple Realtime Quiz System | 2024-08-07 | N/A | 8.8 HIGH |
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been classified as critical. Affected is an unknown function of the file /manage_quiz.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273354 is the identifier assigned to this vulnerability. | |||||
CVE-2024-7371 | 1 Oretnom23 | 1 Simple Realtime Quiz System | 2024-08-07 | N/A | 8.8 HIGH |
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quiz_view.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273355. | |||||
CVE-2024-7372 | 1 Oretnom23 | 1 Simple Realtime Quiz System | 2024-08-07 | N/A | 8.8 HIGH |
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /quiz_board.php. The manipulation of the argument quiz leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273356. | |||||
CVE-2024-7373 | 1 Oretnom23 | 1 Simple Realtime Quiz System | 2024-08-07 | N/A | 8.8 HIGH |
A vulnerability classified as critical has been found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=load_answered. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273357 was assigned to this vulnerability. | |||||
CVE-2024-33974 | 1 Janobe | 2 School Attendence Monitoring System, School Event Management System | 2024-08-07 | N/A | 9.8 CRITICAL |
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Users in '/report/printlogs.php' parameter. |