Total
14188 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-17917 | 1 Rubyonrails | 1 Rails | 2024-08-05 | 6.8 MEDIUM | 8.1 HIGH |
SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input | |||||
CVE-2017-17920 | 1 Rubyonrails | 1 Ruby On Rails | 2024-08-05 | 6.8 MEDIUM | 8.1 HIGH |
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input | |||||
CVE-2017-17919 | 1 Rubyonrails | 1 Ruby On Rails | 2024-08-05 | 6.8 MEDIUM | 8.1 HIGH |
SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input | |||||
CVE-2017-17916 | 1 Rubyonrails | 1 Rails | 2024-08-05 | 6.8 MEDIUM | 8.1 HIGH |
SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input | |||||
CVE-2017-9443 | 1 Bigtreecms | 1 Bigtree Cms | 2024-08-05 | 6.5 MEDIUM | 8.8 HIGH |
BigTree CMS through 4.2.18 allows remote authenticated users to conduct SQL injection attacks via a crafted tables object in manifest.json in an uploaded package. This issue exists in core\admin\modules\developer\extensions\install\process.php and core\admin\modules\developer\packages\install\process.php. NOTE: the vendor states "You must implicitly trust any package or extension you install as they all have the ability to write PHP files. | |||||
CVE-2018-9230 | 1 Openresty | 1 Openresty | 2024-08-05 | 7.5 HIGH | 9.8 CRITICAL |
In OpenResty through 1.13.6.1, URI parameters are obtained using the ngx.req.get_uri_args and ngx.req.get_post_args functions that ignore parameters beyond the hundredth one, which might allow remote attackers to bypass intended access restrictions or interfere with certain Web Application Firewall (ngx_lua_waf or X-WAF) products. NOTE: the vendor has reported that 100 parameters is an intentional default setting, but is adjustable within the API. The vendor's position is that a security-relevant misuse of the API by a WAF product is a vulnerability in the WAF product, not a vulnerability in OpenResty | |||||
CVE-2018-6382 | 1 Mantisbt | 1 Mantisbt | 2024-08-05 | 2.1 LOW | 3.3 LOW |
MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass | |||||
CVE-2018-6393 | 1 Sangoma | 1 Freepbx | 2024-08-05 | 6.5 MEDIUM | 7.2 HIGH |
FreePBX 10.13.66-32bit and 14.0.1.24 (SNG7-PBX-64bit-1712-2) allow post-authentication SQL injection via the order parameter. NOTE: the vendor disputes this issue because it is intentional that a user can "directly modify SQL tables ... [or] run shell scripts ... once ... logged in to the administration interface; there is no need to try to find input validation errors. | |||||
CVE-2019-15562 | 1 Gorm | 1 Gorm | 2024-08-05 | 7.5 HIGH | 9.8 CRITICAL |
GORM before 1.9.10 allows SQL injection via incomplete parentheses. NOTE: Misusing Gorm by passing untrusted user input where Gorm expects trusted SQL fragments is a vulnerability in the application, not in Gorm | |||||
CVE-2019-12279 | 1 Nagios | 1 Nagios Xi | 2024-08-05 | 7.5 HIGH | 9.8 CRITICAL |
Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck | |||||
CVE-2021-4276 | 1 Dns-stats | 1 Hedgehog | 2024-08-03 | N/A | 8.8 HIGH |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don’t believe this specific attack is possible without such a compromise of the Data Manager server. | |||||
CVE-2021-3118 | 1 Medicalexpo | 1 Ecs Imaging | 2024-08-03 | 7.5 HIGH | 9.8 CRITICAL |
EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer | |||||
CVE-2022-44117 | 1 Boa | 1 Boa | 2024-08-03 | N/A | 9.8 CRITICAL |
Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL. | |||||
CVE-2022-40833 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability. | |||||
CVE-2022-40835 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php. Note: Multiple third parties have disputed this as not a valid vulnerability | |||||
CVE-2022-40824 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where() function. Note: Multiple third parties have disputed this as not a valid vulnerability. | |||||
CVE-2022-40832 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php having() function. Note: Multiple third parties have disputed this as not a valid vulnerability. | |||||
CVE-2022-40831 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php like() function. Note: Multiple third parties have disputed this as not a valid vulnerability. | |||||
CVE-2022-40834 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_not_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability. | |||||
CVE-2022-40829 | 1 Codeigniter | 1 Codeigniter | 2024-08-03 | N/A | 9.8 CRITICAL |
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability. |