Total
14188 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-4492 | 1 Campcodes | 1 Online Food Ordering System | 2025-05-13 | N/A | 9.8 CRITICAL |
A vulnerability, which was classified as critical, has been found in Campcodes Online Food Ordering System 1.0. This issue affects some unknown processing of the file /routers/ticket-message.php. The manipulation of the argument ticket_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2022-42121 | 1 Liferay | 3 Digital Experience Platform, Dxp, Liferay Portal | 2025-05-13 | N/A | 8.8 HIGH |
A SQL injection vulnerability in the Layout module in Liferay Portal 7.1.3 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before service pack 3, and 7.4 GA allows remote authenticated attackers to execute arbitrary SQL commands via a crafted payload injected into a page template's 'Name' field. | |||||
CVE-2022-41498 | 1 Billing System Project | 1 Billing System | 2025-05-13 | N/A | 7.2 HIGH |
Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /phpinventory/editbrand.php. | |||||
CVE-2025-32389 | 1 Namelessmc | 1 Nameless | 2025-05-13 | N/A | 6.5 MEDIUM |
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4. | |||||
CVE-2022-42218 | 1 Open Source Sacco Management System Project | 1 Open Source Sacco Management System | 2025-05-13 | N/A | 7.2 HIGH |
Open Source SACCO Management System v1.0 vulnerable to SQL Injection via /sacco_shield/manage_loan.php. | |||||
CVE-2025-4248 | 1 Chuck24 | 1 Simple To-do List System | 2025-05-13 | N/A | 9.8 CRITICAL |
A vulnerability has been found in SourceCodester Simple To-Do List System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /complete_task.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4247 | 1 Chuck24 | 1 Simple To-do List System | 2025-05-13 | N/A | 8.8 HIGH |
A vulnerability, which was classified as critical, was found in SourceCodester Simple To-Do List System 1.0. Affected is an unknown function of the file /delete_task.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3107 | 2025-05-13 | N/A | 6.5 MEDIUM | ||
The Newsletters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby' parameter in all versions up to, and including, 4.9.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | |||||
CVE-2025-4396 | 2025-05-13 | N/A | 7.5 HIGH | ||
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database. | |||||
CVE-2023-49641 | 2025-05-13 | N/A | 9.8 CRITICAL | ||
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database. | |||||
CVE-2021-37782 | 1 Phpgurukul | 1 Employee Record Management System | 2025-05-12 | N/A | 9.8 CRITICAL |
Employee Record Management System v 1.2 is vulnerable to SQL Injection via editempprofile.php. | |||||
CVE-2025-46578 | 1 Zte | 1 Zxcloud Goldendb | 2025-05-12 | N/A | 7.5 HIGH |
There are SQL injection vulnerabilities in multiple interfaces of the GoldenDB database product. Attackers can exploit these interfaces to inject commands and extract sensitive database information. | |||||
CVE-2025-46577 | 1 Zte | 1 Zxcloud Goldendb | 2025-05-12 | N/A | 7.5 HIGH |
There is a SQL injection vulnerability in the GoldenDB database product. Attackers can inject commands to extract database information. | |||||
CVE-2025-4014 | 1 Phpgurukul | 1 Art Gallery Management System | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-art-medium.php. The manipulation of the argument artmed leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4004 | 1 Phpgurukul | 1 Covid19 Testing Management System | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability was found in PHPGurukul COVID19 Testing Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | |||||
CVE-2025-4013 | 1 Phpgurukul | 1 Art Gallery Management System | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/aboutus.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4005 | 1 Phpgurukul | 1 Covid19 Testing Management System | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability was found in PHPGurukul COVID19 Testing Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /patient-report.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3956 | 1 Xxyopen | 1 Novel-cloud | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability has been found in 201206030 novel-cloud 1.4.0 and classified as critical. This vulnerability affects the function RestResp of the file novel-cloud-master/novel-book/novel-book-service/src/main/resources/mapper/BookInfoMapper.xml. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2025-3957 | 1 Opplus | 1 Springboot-admin | 2025-05-12 | N/A | 9.8 CRITICAL |
A vulnerability was found in opplus springboot-admin 1.0 and classified as critical. This issue affects some unknown processing of the file \src\main\resources\mapper\sys\SysLogDao.xml. The manipulation of the argument order leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-25223 | 1 Code-projects | 1 Simple Admin Panel | 2025-05-12 | N/A | 9.8 CRITICAL |
Simple Admin Panel App v1.0 was discovered to contain a SQL injection vulnerability via the orderID parameter at /adminView/viewEachOrder.php. |