Total
16884 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2024-10968 | 1 1000projects | 1 Bookstore Management System | 2024-12-10 | 7.5 HIGH | 7.3 HIGH |
| A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2020-20491 | 1 Opencart | 1 Opencart | 2024-12-10 | N/A | 7.2 HIGH |
| SQL injection vulnerability in OpenCart v.2.2.00 thru 3.0.3.2 allows a remote attacker to execute arbitrary code via the Fba plugin function in upload/admin/index.php. | |||||
| CVE-2020-20413 | 1 Wuzhicms | 1 Wuzhicms | 2024-12-10 | N/A | 9.8 CRITICAL |
| SQL injection vulnerability found in WUZHICMS v.4.1.0 allows a remote attacker to execute arbitrary code via the checktitle() function in admin/content.php. | |||||
| CVE-2020-20636 | 1 Joyplus-cms Project | 1 Joyplus-cms | 2024-12-10 | N/A | 7.5 HIGH |
| SQL injection vulnerability found in Joyplus-cms v.1.6.0 allows a remote attacker to access sensitive information via the id parameter of the goodbad() function. | |||||
| CVE-2024-46907 | 1 Progress | 1 Whatsup Gold | 2024-12-10 | N/A | 8.8 HIGH |
| In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account. | |||||
| CVE-2024-46908 | 1 Progress | 1 Whatsup Gold | 2024-12-10 | N/A | 8.8 HIGH |
| In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account. | |||||
| CVE-2024-11250 | 1 Code-projects | 1 Inventory Management | 2024-12-10 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability was found in code-projects Inventory Management up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /model/editProduct.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2024-11591 | 1 1000projects | 1 Beauty Parlour Management System | 2024-12-10 | 7.5 HIGH | 7.3 HIGH |
| A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2024-11592 | 1 1000projects | 1 Beauty Parlour Management System | 2024-12-10 | 7.5 HIGH | 7.3 HIGH |
| A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/about-us.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2020-21400 | 1 Phpmywind | 1 Phpmywind | 2024-12-10 | N/A | 7.2 HIGH |
| SQL injection vulnerability in gaozhifeng PHPMyWind v.5.6 allows a remote attacker to execute arbitrary code via the id variable in the modify function. | |||||
| CVE-2024-12187 | 1 1000projects | 1 Library Management System | 2024-12-10 | 7.5 HIGH | 7.3 HIGH |
| A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2024-4933 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability has been found in SourceCodester Simple Online Bidding System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/admin/index.php?page=manage_product. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264469 was assigned to this vulnerability. | |||||
| CVE-2024-4932 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Bidding System 1.0. Affected is an unknown function of the file /simple-online-bidding-system/admin/index.php?page=manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264468. | |||||
| CVE-2024-4931 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability, which was classified as critical, has been found in SourceCodester Simple Online Bidding System 1.0. This issue affects some unknown processing of the file /simple-online-bidding-system/admin/index.php?page=view_udet. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264467. | |||||
| CVE-2024-4930 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability classified as critical was found in SourceCodester Simple Online Bidding System 1.0. This vulnerability affects unknown code of the file /simple-online-bidding-system/index.php?page=view_prod. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264466 is the identifier assigned to this vulnerability. | |||||
| CVE-2024-4928 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /simple-online-bidding-system/admin/ajax.php?action=delete_category. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264464. | |||||
| CVE-2024-2077 | 1 Oretnom23 | 1 Simple Online Bidding System | 2024-12-09 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability classified as critical has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file index.php. The manipulation of the argument category_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255393 was assigned to this vulnerability. | |||||
| CVE-2020-21486 | 1 Phpok | 1 Phpok | 2024-12-09 | N/A | 7.5 HIGH |
| SQL injection vulnerability in PHPOK v.5.4. allows a remote attacker to obtain sensitive information via the _userlist function in framerwork/phpok_call.php file. | |||||
| CVE-2023-34600 | 1 Adiscon | 1 Loganalyzer | 2024-12-09 | N/A | 9.8 CRITICAL |
| Adiscon LogAnalyzer v4.1.13 and before is vulnerable to SQL Injection. | |||||
| CVE-2024-12270 | 2024-12-07 | N/A | 7.5 HIGH | ||
| The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | |||||
