Total
9311 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-20150 | 1 Challenge Website Project | 1 Challenge Website | 2023-01-06 | N/A | 8.8 HIGH |
A vulnerability was found in challenge website. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is f1644b1d3502e5aa5284f31ea80d2623817f4d42. It is recommended to apply a patch to fix this issue. The identifier VDB-216989 was assigned to this vulnerability. | |||||
CVE-2018-25057 | 1 Simple Php Link Shortener Project | 1 Simple Php Link Shortener | 2023-01-06 | N/A | 9.8 CRITICAL |
A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link["id"] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996. | |||||
CVE-2021-4290 | 1 Fallstudie Project | 1 Fallstudie | 2023-01-06 | N/A | 9.8 CRITICAL |
A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907. | |||||
CVE-2022-46442 | 1 Dedecms | 1 Dedecms | 2023-01-05 | N/A | 9.8 CRITICAL |
dedecms <=V5.7.102 is vulnerable to SQL Injection. In sys_ sql_ n query.php there are no restrictions on the sql query. | |||||
CVE-2020-24600 | 1 Capexweb Project | 1 Capexweb | 2023-01-05 | N/A | 9.8 CRITICAL |
Shilpi CAPExWeb 1.1 allows SQL injection via a servlet/capexweb.cap_sendMail GET request. | |||||
CVE-2022-4726 | 1 Sanitization Management System Project | 1 Sanitization Management System | 2023-01-05 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739. | |||||
CVE-2022-4155 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-05 | N/A | 4.9 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database. | |||||
CVE-2022-4154 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-05 | N/A | 4.9 MEDIUM |
The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database. | |||||
CVE-2022-4153 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-05 | N/A | 6.5 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the upload[] POST parameter before concatenating it to an SQL query in get-data-create-upload-v10.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | |||||
CVE-2022-44015 | 1 Simmeth | 1 Lieferantenmanager | 2023-01-04 | N/A | 9.8 CRITICAL |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure. | |||||
CVE-2022-44137 | 1 Sanitization Management System Project | 1 Sanitization Management System | 2023-01-04 | N/A | 7.2 HIGH |
SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection. | |||||
CVE-2022-4152 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 6.5 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5, Contest Gallery Pro WordPress plugin before 19.1.5 do not escape the option_id POST parameter before concatenating it to an SQL query in edit-options.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | |||||
CVE-2020-36631 | 1 Dwc Network Server Emulator Project | 1 Dwc Network Server Emulator | 2023-01-04 | N/A | 9.8 CRITICAL |
A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772. | |||||
CVE-2020-36630 | 1 Sangoma | 1 Freepbx | 2023-01-04 | N/A | 9.8 CRITICAL |
A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771. | |||||
CVE-2022-4156 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 7.5 HIGH |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | |||||
CVE-2022-4157 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 4.9 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database. | |||||
CVE-2022-4158 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 7.5 HIGH |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site's database. | |||||
CVE-2022-4160 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 6.5 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | |||||
CVE-2022-4159 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 6.5 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | |||||
CVE-2022-4162 | 1 Contest-gallery | 1 Contest Gallery | 2023-01-04 | N/A | 6.5 MEDIUM |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. |