Total
14188 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-24949 | 1 Posimyth | 1 The Plus Addons For Elementor | 2022-01-18 | 7.5 HIGH | 9.8 CRITICAL |
The "WP Search Filters" widget of The Plus Addons for Elementor - Pro WordPress plugin before 5.0.7 does not sanitise and escape the option parameter before using it in a SQL statement, which could lead to SQL injection | |||||
CVE-2021-25054 | 1 Wow-company | 1 Wpcalc | 2022-01-14 | 6.5 MEDIUM | 8.8 HIGH |
The WPcalc WordPress plugin through 2.1 does not sanitize user input into the 'did' parameter and uses it in a SQL statement, leading to an authenticated SQL Injection vulnerability. | |||||
CVE-2020-28103 | 1 Chshcms | 1 Cscms | 2022-01-14 | 7.5 HIGH | 9.8 CRITICAL |
cscms v4.1 allows for SQL injection via the "page_del" function. | |||||
CVE-2020-28102 | 1 Chshcms | 1 Cscms | 2022-01-14 | 7.5 HIGH | 9.8 CRITICAL |
cscms v4.1 allows for SQL injection via the "js_del" function. | |||||
CVE-2021-39978 | 1 Huawei | 1 Harmonyos | 2022-01-13 | 5.0 MEDIUM | 7.5 HIGH |
Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. | |||||
CVE-2021-25030 | 1 E-dynamics | 1 Events Made Easy | 2022-01-11 | 6.5 MEDIUM | 8.8 HIGH |
The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks | |||||
CVE-2021-36722 | 1 Emuse - Eservices \/ Envoice Project | 1 Emuse - Eservices \/ Envoice | 2022-01-11 | 10.0 HIGH | 9.8 CRITICAL |
Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host. | |||||
CVE-2021-44161 | 1 Changingtec | 1 Motp | 2022-01-10 | 5.8 MEDIUM | 8.8 HIGH |
Changing MOTP (Mobile One Time Password) system’s specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication. | |||||
CVE-2021-45814 | 1 Nettemp | 1 Nnt | 2022-01-07 | 7.5 HIGH | 9.8 CRITICAL |
Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account. | |||||
CVE-2021-24753 | 1 Starfish | 1 Rich Review | 2022-01-06 | 6.5 MEDIUM | 7.2 HIGH |
The Rich Reviews by Starfish WordPress plugin before 1.9.6 does not properly validate the orderby GET parameter of the pending reviews page before using it in a SQL statement, leading to an authenticated SQL injection issue | |||||
CVE-2020-26248 | 1 Prestashop | 1 Productcomments | 2022-01-06 | 6.4 MEDIUM | 8.2 HIGH |
In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module. | |||||
CVE-2021-45255 | 1 Video Sharing Website Project | 1 Video Sharing Website | 2022-01-04 | 10.0 HIGH | 9.8 CRITICAL |
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. | |||||
CVE-2021-44599 | 1 Online Enrollment Management System Project | 1 Online Enrollment Management System | 2022-01-04 | 5.0 MEDIUM | 7.5 HIGH |
The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system. | |||||
CVE-2021-45041 | 1 Salesagility | 1 Suitecrm | 2022-01-04 | 6.5 MEDIUM | 8.8 HIGH |
SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection via the Tooltips action in the Project module, involving resource_id and start_date. | |||||
CVE-2021-24747 | 1 Cleverplugins | 1 Seo Booster | 2022-01-04 | 6.5 MEDIUM | 7.2 HIGH |
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections. | |||||
CVE-2021-41063 | 1 Xylem | 1 Aanderaa Geoview | 2022-01-04 | 7.5 HIGH | 9.8 CRITICAL |
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands. | |||||
CVE-2021-3817 | 1 Wbce | 1 Wbce Cms | 2022-01-04 | 7.5 HIGH | 9.8 CRITICAL |
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command | |||||
CVE-2020-3934 | 1 Secom | 2 Dr.id Access Control, Dr.id Attendance System | 2022-01-01 | 7.5 HIGH | 9.8 CRITICAL |
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, contains a vulnerability of Pre-auth SQL Injection, allowing attackers to inject a specific SQL command. | |||||
CVE-2020-8656 | 1 Eyesofnetwork | 1 Eyesofnetwork | 2022-01-01 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php. | |||||
CVE-2020-8427 | 1 Unitrends | 1 Backup | 2022-01-01 | 7.5 HIGH | 9.8 CRITICAL |
In Unitrends Backup before 10.4.1, an HTTP request parameter was not properly sanitized, allowing for SQL injection that resulted in an authentication bypass. |