Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-89
Total 9311 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-32348 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_doctor.
CVE-2022-32347 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_room.
CVE-2022-32338 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/admin/doctors/manage_doctor.php?id=.
CVE-2022-32346 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/admin/rooms/view_room.php?id=.
CVE-2022-32351 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_message.
CVE-2022-32350 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2022-06-21 6.5 MEDIUM 7.2 HIGH
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_room_type.
CVE-2022-28452 1 Redplanetcomputers 1 Laundry Management System 2022-06-21 7.5 HIGH 9.8 CRITICAL
Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
CVE-2022-1800 1 Export Any Wordpress Data To Xml\/csv Project 1 Export Any Wordpress Data To Xml\/csv 2022-06-21 6.5 MEDIUM 7.2 HIGH
The Export any WordPress data to XML/CSV WordPress plugin before 1.3.5 does not sanitize the cpt POST parameter when exporting post data before using it in a database query, leading to an SQL injection vulnerability.
CVE-2022-0827 1 Presspage 1 Bestbooks 2022-06-17 7.5 HIGH 9.8 CRITICAL
The Bestbooks WordPress plugin through 2.6.3 does not sanitise and escape some parameters before using them in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users
CVE-2022-0786 1 Iqonic 1 Kivicare 2022-06-17 7.5 HIGH 9.8 CRITICAL
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
CVE-2020-36543 1 Sialweb 1 Sialweb Cms 2022-06-17 6.5 MEDIUM 8.8 HIGH
A vulnerability, which was classified as critical, was found in SialWeb CMS. This affects an unknown part of the file /about.php. The manipulation of the argument Id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-31788 1 Ideaco 1 Idealms 2022-06-17 7.5 HIGH 9.8 CRITICAL
IdeaLMS 2022 allows SQL injection via the IdeaLMS/ChatRoom/ClassAccessControl/6?isBigBlueButton=0&ClassID= pathname.
CVE-2017-20029 1 Phplist 1 Phplist 2022-06-17 7.5 HIGH 9.8 CRITICAL
A vulnerability was found in PHPList 3.2.6 and classified as critical. This issue affects some unknown processing of the file /lists/index.php of the component Edit Subscription. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2017-20030 1 Phplist 1 Phplist 2022-06-17 6.5 MEDIUM 7.2 HIGH
A vulnerability was found in PHPList 3.2.6. It has been classified as critical. Affected is an unknown function of the file /lists/admin/ of the component Sending Campain. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2017-20032 1 Phplist 1 Phplist 2022-06-17 7.5 HIGH 9.8 CRITICAL
A vulnerability was found in PHPList 3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Subscription. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2021-41754 1 Dynamicvision 1 Dynamicmarkt 2022-06-17 7.5 HIGH 9.8 CRITICAL
dynamicMarkt <= 3.10 is affected by SQL injection in the parent parameter of index.php.
CVE-2021-41755 1 Dynamicvision 1 Dynamicmarkt 2022-06-17 7.5 HIGH 9.8 CRITICAL
dynamicMarkt <= 3.10 is affected by SQL injection in the kat1 parameter of index.php.
CVE-2021-41756 1 Dynamicvision 1 Dynamicmarkt 2022-06-17 7.5 HIGH 9.8 CRITICAL
dynamicMarkt <= 3.10 is affected by SQL injection in the kat parameter of index.php.
CVE-2022-29250 1 Glpi-project 1 Glpi 2022-06-16 4.0 MEDIUM 6.5 MEDIUM
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to version 10.0.1 it is possible to add extra information by SQL injection on search pages. In order to exploit this vulnerability a user must be logged in.
CVE-2022-1692 1 Dwbooster 1 Cp Image Store With Slideshow 2022-06-15 7.5 HIGH 9.8 CRITICAL
The CP Image Store with Slideshow WordPress plugin before 1.0.68 does not sanitise and escape the ordering_by query parameter before using it in a SQL statement in pages where the [codepeople-image-store] is embed, allowing unauthenticated users to perform an SQL injection attack