Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-89
Total 9311 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-20796 1 Flamecms Project 1 Flamecms 2021-10-04 7.5 HIGH 9.8 CRITICAL
FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the "Id" parameter.
CVE-2020-20797 1 Flamecms Project 1 Flamecms 2021-10-04 7.5 HIGH 9.8 CRITICAL
FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php.
CVE-2021-24741 1 Schiocco 1 Support Board - Chat And Help Desk 2021-10-01 7.5 HIGH 9.8 CRITICAL
The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
CVE-2021-24606 1 Offshorewebmaster 1 Availability Calendar 2021-10-01 6.5 MEDIUM 8.8 HIGH
The Availability Calendar WordPress plugin before 1.2.1 does not escape the category attribute from its shortcode before using it in a SQL statement, leading to a SQL Injection issue, which can be exploited by any user able to add shortcode to posts/pages, such as contributor+
CVE-2021-38303 1 Surelinesystems 1 Sureedge Migrator 2021-10-01 7.5 HIGH 9.8 CRITICAL
A SQL injection vulnerability exists in Sureline SUREedge Migrator 7.0.7.29360.
CVE-2020-20692 1 Gilacms 1 Gila Cms 2021-10-01 6.5 MEDIUM 7.2 HIGH
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
CVE-2021-36880 1 Stylemixthemes 1 Ulisting 2021-09-30 7.5 HIGH 9.8 CRITICAL
Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom.
CVE-2021-40309 1 Os4ed 1 Opensis 2021-09-30 6.5 MEDIUM 8.8 HIGH
A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability.
CVE-2019-10910 2 Drupal, Sensiolabs 2 Drupal, Symfony 2021-09-29 7.5 HIGH 9.8 CRITICAL
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
CVE-2014-3704 2 Debian, Drupal 2 Debian Linux, Drupal 2021-09-29 7.5 HIGH N/A
The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.
CVE-2021-24398 1 Webpsilon 1 Responsive 3d Slider 2021-09-29 6.5 MEDIUM 7.2 HIGH
The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.
CVE-2021-24401 1 Wp-domain-redirect Project 1 Wp-domain-redirect 2021-09-29 6.5 MEDIUM 7.2 HIGH
The Edit domain functionality in the WP Domain Redirect WordPress plugin through 1.0 has an `editid` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24402 1 Solvercircle 1 Wp Icommerce 2021-09-29 6.5 MEDIUM 7.2 HIGH
The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
CVE-2021-24511 1 Dpl 1 Product Feed On Woocommerce 2021-09-29 6.5 MEDIUM 7.2 HIGH
The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a `product_id` POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24403 1 Wpagecontact Project 1 Wpagecontact 2021-09-28 6.5 MEDIUM 7.2 HIGH
The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
CVE-2021-24397 1 Activemedia 1 Microcopy 2021-09-28 6.5 MEDIUM 7.2 HIGH
The edit functionality in the MicroCopy WordPress plugin through 1.1.0 makes a get request to fetch the related option. The id parameter used is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-24404 1 Wp-board Project 1 Wp-board 2021-09-28 6.5 MEDIUM 8.8 HIGH
The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
CVE-2021-24399 1 Ombu 1 The Sorter 2021-09-28 6.5 MEDIUM 7.2 HIGH
The check_order function of The Sorter WordPress plugin through 1.0 uses an `area_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
CVE-2021-40674 1 Wuzhicms 1 Wuzhicms 2021-09-28 7.5 HIGH 9.8 CRITICAL
An SQL injection vulnerability exists in Wuzhi CMS v4.1.0 via the KeyValue parameter in coreframe/app/order/admin/index.php.
CVE-2021-24396 1 Bestiaweb 1 Gseor 2021-09-28 6.5 MEDIUM 7.2 HIGH
A pageid GET parameter of the GSEOR – WordPress SEO Plugin WordPress plugin through 1.3 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.