Total
9311 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-0948 | 1 Pluginbazaar | 1 Order Listener For Woocommerce | 2022-05-17 | 7.5 HIGH | 9.8 CRITICAL |
The Order Listener for WooCommerce WordPress plugin before 3.2.2 does not sanitise and escape the id parameter before using it in a SQL statement via a REST route available to unauthenticated users, leading to an SQL injection | |||||
CVE-2022-0592 | 1 Mapsvg | 1 Mapsvg | 2022-05-16 | 7.5 HIGH | 9.8 CRITICAL |
The MapSVG WordPress plugin before 6.2.20 does not validate and escape a parameter via a REST endpoint before using it in a SQL statement, leading to a SQL Injection exploitable by unauthenticated users. | |||||
CVE-2022-0783 | 1 Themehigh | 1 Multiple Shipping Addresses For Woocommerce | 2022-05-16 | 7.5 HIGH | 9.8 CRITICAL |
The Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections | |||||
CVE-2022-0826 | 1 Wp-video-gallery-free Project | 1 Wp-video-gallery-free | 2022-05-16 | 7.5 HIGH | 9.8 CRITICAL |
The WP Video Gallery WordPress plugin through 1.7.1 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users | |||||
CVE-2022-0817 | 1 Badgeos | 1 Badgeos | 2022-05-16 | 7.5 HIGH | 9.8 CRITICAL |
The BadgeOS WordPress plugin through 3.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users | |||||
CVE-2022-28163 | 1 Broadcom | 1 Sannav | 2022-05-13 | 7.5 HIGH | 9.8 CRITICAL |
In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands. | |||||
CVE-2020-19216 | 1 Piwigo | 1 Piwigo | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
SQL Injection vulnerability in admin/user_perm.php in piwigo v2.9.5, via the cat_false parameter to admin.php?page=group_perm. | |||||
CVE-2020-19217 | 1 Piwigo | 1 Piwigo | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
SQL Injection vulnerability in admin/batch_manager.php in piwigo v2.9.5, via the filter_category parameter to admin.php?page=batch_manager. | |||||
CVE-2020-19213 | 1 Piwigo | 1 Piwigo | 2022-05-13 | 7.5 HIGH | 9.8 CRITICAL |
SQL Injection vulnerability in cat_move.php in piwigo v2.9.5, via the selection parameter to move_categories. | |||||
CVE-2020-19215 | 1 Piwigo | 1 Piwigo | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
SQL Injection vulnerability in admin/user_perm.php in piwigo v2.9.5, via the cat_false parameter to admin.php?page=user_perm. | |||||
CVE-2020-19212 | 1 Piwigo | 1 Piwigo | 2022-05-13 | 4.0 MEDIUM | 4.9 MEDIUM |
SQL Injection vulnerability in admin/group_list.php in piwigo v2.9.5, via the group parameter to delete. | |||||
CVE-2021-42235 | 1 Enhancesoft | 1 Osticket | 2022-05-13 | 7.5 HIGH | 9.8 CRITICAL |
SQL injection in osTicket before 1.14.8 and 1.15.4 login and password reset process allows attackers to access the osTicket administration profile functionality. | |||||
CVE-2021-21917 | 1 Advantech | 1 R-seenet | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-21915 | 1 Advantech | 1 R-seenet | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2021-21916 | 1 Advantech | 1 R-seenet | 2022-05-13 | 6.5 MEDIUM | 8.8 HIGH |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | |||||
CVE-2022-28461 | 1 Mingyuefusu Project | 1 Mingyuefusu | 2022-05-13 | 7.5 HIGH | 9.8 CRITICAL |
mingyuefusu Library Management System all versions as of 03-27-2022 is vulnerable to SQL Injection. | |||||
CVE-2022-27360 | 1 Bladex | 1 Springblade | 2022-05-12 | 7.5 HIGH | 9.8 CRITICAL |
SpringBlade v3.2.0 and below was discovered to contain a SQL injection vulnerability via the component customSqlSegment. | |||||
CVE-2022-29938 | 1 Librehealth | 1 Librehealth Ehr | 2022-05-12 | 6.5 MEDIUM | 8.8 HIGH |
In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameter payment_id in interface\billing\new_payment.php via interface\billing\payment_master.inc.php leads to SQL injection. | |||||
CVE-2022-24707 | 1 Anuko | 1 Time Tracker | 2022-05-12 | 6.5 MEDIUM | 8.8 HIGH |
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker prior to 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible to craft POST requests with malicious SQL for Time Tracker database. This issue has been resolved in in version 1.20.0.5642. Users unable to upgrade are advised to add their own checks to input. | |||||
CVE-2022-25490 | 1 Hospital Management System Project | 1 Hospital Management System | 2022-05-12 | 7.5 HIGH | 9.8 CRITICAL |
HMS v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in department.php. |