Vulnerabilities (CVE)

Filtered by CWE-89
Total 14188 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-41651 1 Hotel Management System Project 1 Hotel Management System 2021-10-12 5.0 MEDIUM 7.5 HIGH
A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel-mgmt-system. A malicious attacker can retrieve sensitive database information and interact with the database using the vulnerable cid parameter in process_update_profile.php.
CVE-2021-24465 1 Meowapps 1 Meow Gallery 2021-10-08 5.5 MEDIUM 8.1 HIGH
The Meow Gallery WordPress plugin before 4.1.9 does not sanitise, validate or escape the ids attribute of its gallery shortcode (available for users as low as Contributor) before using it in an SQL statement, leading to an authenticated SQL Injection issue. The injection also allows the returned values to be manipulated in a way that could lead to data disclosure and arbitrary objects to be deserialized.
CVE-2020-21012 1 Hotel And Lodge Booking Management System Project 1 Hotel And Lodge Booking Management System 2021-10-08 7.5 HIGH 9.8 CRITICAL
Sourcecodester Hotel and Lodge Management System 2.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the email parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
CVE-2020-21013 1 Emlog 1 Emlog 2021-10-08 6.5 MEDIUM 7.2 HIGH
emlog v6.0.0 contains a SQL injection via /admin/comment.php.
CVE-2021-41647 1 Online Food Ordering Web App Project 1 Online Food Ordering Web App 2021-10-08 6.4 MEDIUM 9.1 CRITICAL
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
CVE-2021-41845 1 Thycotic 1 Secret Server 2021-10-07 4.0 MEDIUM 6.5 MEDIUM
A SQL injection issue was discovered in ThycoticCentrify Secret Server before 11.0.000007. The only affected versions are 10.9.000032 through 11.0.000006.
CVE-2020-24673 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 7.5 HIGH 9.8 CRITICAL
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
CVE-2021-41288 1 Zohocorp 1 Manageengine Opmanager 2021-10-07 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.
CVE-2020-20120 1 Thinkphp 1 Thinkphp 2021-10-06 7.5 HIGH 9.8 CRITICAL
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.
CVE-2021-24666 1 Podlove 1 Podlove Podcast Publisher 2021-10-05 6.8 MEDIUM 9.8 CRITICAL
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.
CVE-2020-20796 1 Flamecms Project 1 Flamecms 2021-10-04 7.5 HIGH 9.8 CRITICAL
FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the "Id" parameter.
CVE-2020-20797 1 Flamecms Project 1 Flamecms 2021-10-04 7.5 HIGH 9.8 CRITICAL
FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php.
CVE-2021-24606 1 Offshorewebmaster 1 Availability Calendar 2021-10-01 6.5 MEDIUM 8.8 HIGH
The Availability Calendar WordPress plugin before 1.2.1 does not escape the category attribute from its shortcode before using it in a SQL statement, leading to a SQL Injection issue, which can be exploited by any user able to add shortcode to posts/pages, such as contributor+
CVE-2021-38303 1 Surelinesystems 1 Sureedge Migrator 2021-10-01 7.5 HIGH 9.8 CRITICAL
A SQL injection vulnerability exists in Sureline SUREedge Migrator 7.0.7.29360.
CVE-2020-20692 1 Gilacms 1 Gila Cms 2021-10-01 6.5 MEDIUM 7.2 HIGH
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
CVE-2021-36880 1 Stylemixthemes 1 Ulisting 2021-10-01 7.5 HIGH 9.8 CRITICAL
Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom.
CVE-2021-40309 1 Os4ed 1 Opensis 2021-10-01 6.5 MEDIUM 8.8 HIGH
A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability.
CVE-2019-10910 2 Drupal, Sensiolabs 2 Drupal, Symfony 2021-09-29 7.5 HIGH 9.8 CRITICAL
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
CVE-2014-3704 2 Debian, Drupal 2 Debian Linux, Drupal 2021-09-29 7.5 HIGH N/A
The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.
CVE-2021-24398 1 Webpsilon 1 Responsive 3d Slider 2021-09-29 6.5 MEDIUM 7.2 HIGH
The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.