Vulnerabilities (CVE)

Filtered by CWE-89
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-45255 1 Video Sharing Website Project 1 Video Sharing Website 2022-01-04 10.0 HIGH 9.8 CRITICAL
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
CVE-2021-44599 1 Online Enrollment Management System Project 1 Online Enrollment Management System 2022-01-04 5.0 MEDIUM 7.5 HIGH
The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.
CVE-2021-44600 1 Online Mens Salon Management System Project 1 Online Mens Salon Management System 2022-01-04 5.0 MEDIUM 7.5 HIGH
The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.
CVE-2021-45041 1 Salesagility 1 Suitecrm 2022-01-04 6.5 MEDIUM 8.8 HIGH
SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection via the Tooltips action in the Project module, involving resource_id and start_date.
CVE-2021-24747 1 Cleverplugins 1 Seo Booster 2022-01-04 6.5 MEDIUM 7.2 HIGH
The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
CVE-2021-41063 1 Xylem 1 Aanderaa Geoview 2022-01-04 7.5 HIGH 9.8 CRITICAL
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.
CVE-2021-3817 1 Wbce 1 Wbce Cms 2022-01-04 7.5 HIGH 9.8 CRITICAL
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
CVE-2021-3860 1 Jfrog 1 Artifactory 2022-01-03 6.5 MEDIUM 8.8 HIGH
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.
CVE-2021-35234 1 Solarwinds 1 Orion Platform 2022-01-03 6.5 MEDIUM 8.8 HIGH
Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information.
CVE-2020-3934 1 Secom 2 Dr.id Access Control, Dr.id Attendance System 2022-01-01 7.5 HIGH 9.8 CRITICAL
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, contains a vulnerability of Pre-auth SQL Injection, allowing attackers to inject a specific SQL command.
CVE-2020-8656 1 Eyesofnetwork 1 Eyesofnetwork 2022-01-01 7.5 HIGH 9.8 CRITICAL
An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
CVE-2020-8427 1 Unitrends 1 Backup 2022-01-01 7.5 HIGH 9.8 CRITICAL
In Unitrends Backup before 10.4.1, an HTTP request parameter was not properly sanitized, allowing for SQL injection that resulted in an authentication bypass.
CVE-2020-25760 1 Projectworlds 1 Visitor Management System In Php 2022-01-01 6.5 MEDIUM 8.8 HIGH
Projectworlds Visitor Management System in PHP 1.0 allows SQL Injection. The file front.php does not perform input validation on the 'rid' parameter. An attacker can append SQL queries to the input to extract sensitive information from the database.
CVE-2020-1937 1 Apache 1 Kylin 2021-12-30 6.5 MEDIUM 8.8 HIGH
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
CVE-2021-43851 1 Anuko 1 Time Tracker 2021-12-28 6.5 MEDIUM 8.8 HIGH
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. SQL injection vulnerability exist in multiple files in Time Tracker version 1.19.33.5606 and prior due to not properly checking of the "group" and "status" parameters in POST requests. Group parameter is posted along when navigating between organizational subgroups (groups.php file). Status parameter is used in multiple files to change a status of an entity such as making a project, task, or user inactive. This issue has been patched in version 1.19.33.5607. An upgrade is highly recommended. If an upgrade is not practical, introduce ttValidStatus function as in the latest version and start using it user input check blocks wherever status field is used. For groups.php fix, introduce ttValidInteger function as in the latest version and use it in the access check block in the file.
CVE-2021-43157 1 Projectworlds 1 Online Shopping System In Php 2021-12-28 7.5 HIGH 9.8 CRITICAL
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
CVE-2021-43629 1 Projectworlds 1 Hospital Management System In Php 2021-12-28 7.5 HIGH 9.8 CRITICAL
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php.
CVE-2021-43630 1 Projectworlds 1 Hospital Management System In Php 2021-12-28 6.5 MEDIUM 8.8 HIGH
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.
CVE-2021-43631 1 Projectworlds 1 Hospital Management System In Php 2021-12-28 7.5 HIGH 9.8 CRITICAL
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php.
CVE-2021-43628 1 Projectworlds 1 Hospital Management System In Php 2021-12-28 7.5 HIGH 9.8 CRITICAL
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php.
CVE-2021-43155 1 Projectworlds 1 Online Book Store Project In Php 2021-12-28 7.5 HIGH 9.8 CRITICAL
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php.
CVE-2021-44653 1 Online Magazine Management System Project 1 Online Magazine Management System 2021-12-28 7.5 HIGH 9.8 CRITICAL
Online Magazine Management System 1.0 contains a SQL injection authentication bypass vulnerability. The Admin panel authentication can be bypassed due to SQL injection vulnerability in the login form allowing attacker to gain access as admin to the application.
CVE-2021-44874 1 Dalmark 1 Systeam Enterprise Resource Planning 2021-12-27 6.5 MEDIUM 8.8 HIGH
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Insecure design on report build via SQL query. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. The bi report module exposes direct SQL commands via POST data in order to select data for report generation. A malicious actor can use the bi report endpoint as a direct SQL prompt under the authenticated user.
CVE-2021-45253 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Managment System 2021-12-27 7.5 HIGH 9.8 CRITICAL
The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
CVE-2021-45252 1 Simple Forum\/discussion System Project 1 Simple Forum\/discussion System 2021-12-27 7.5 HIGH 9.8 CRITICAL
Multiple SQL injection vulnerabilities are found on Simple Forum-Discussion System 1.0 For example on three applications which are manage_topic.php, manage_user.php, and ajax.php. The attacker can be retrieving all information from the database of this system by using this vulnerability.
CVE-2021-24846 1 Ni Woocommerce Custom Order Status Project 1 Ni Woocommerce Custom Order Status 2021-12-27 6.5 MEDIUM 8.8 HIGH
The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber
CVE-2021-24849 1 Wclovers 1 Frontend Manager For Woocommerce Along With Bookings Subscription Listings Compatible 2021-12-27 7.5 HIGH 9.8 CRITICAL
The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections
CVE-2021-22207 3 Fedoraproject, Oracle, Wireshark 3 Fedora, Zfs Storage Appliance Kit, Wireshark 2021-12-26 5.0 MEDIUM 6.5 MEDIUM
Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file
CVE-2020-18081 1 Sem-cms 1 Semcms 2021-12-22 5.0 MEDIUM 7.5 HIGH
The checkuser function of SEMCMS 3.8 was discovered to contain a vulnerability which allows attackers to obtain the password in plaintext through a SQL query.
CVE-2021-41843 1 Open-emr 1 Openemr 2021-12-22 6.8 MEDIUM 6.5 MEDIUM
An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.
CVE-2021-44655 1 Online Pre-owned\/used Car Showroom Management System Project 1 Online Pre-owned\/used Car Showroom Management System 2021-12-22 7.5 HIGH 9.8 CRITICAL
Online Pre-owned/Used Car Showroom Management System 1.0 contains a SQL injection authentication bypass vulnerability. Admin panel authentication can be bypassed due to SQL injection vulnerability in the login form allowing attacker to get admin access on the application.
CVE-2021-43451 1 Employee Record Management System Project 1 Employee Record Management System 2021-12-22 7.5 HIGH 9.8 CRITICAL
SQL Injection vulnerability exists in PHPGURUKUL Employee Record Management System 1.2 via the Email POST parameter in /forgetpassword.php.
CVE-2021-44280 1 Attendance Management System Project 1 Attendance Management System 2021-12-22 7.5 HIGH 9.8 CRITICAL
attendance management system 1.0 is affected by a SQL injection vulnerability in admin/incFunctions.php through the makeSafe function.
CVE-2021-41262 1 Galette 1 Galette 2021-12-21 6.5 MEDIUM 8.8 HIGH
Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to SQL injection attacks by users with "member" privilege. Users are advised to upgrade to version 0.9.6 as soon as possible. There are no known workarounds.
CVE-2021-40850 1 Tcman 1 Gim 2021-12-21 7.5 HIGH 9.8 CRITICAL
TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.
CVE-2021-43806 1 Enalean 1 Tuleap 2021-12-21 6.5 MEDIUM 8.8 HIGH
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6.
CVE-2021-43830 1 Openproject 1 Openproject 2021-12-20 6.5 MEDIUM 8.8 HIGH
OpenProject is a web-based project management software. OpenProject versions >= 12.0.0 are vulnerable to a SQL injection in the budgets module. For authenticated users with the "Edit budgets" permission, the request to reassign work packages to another budget unsufficiently sanitizes user input in the `reassign_to_id` parameter. The vulnerability has been fixed in version 12.0.4. Versions prior to 12.0.0 are not affected. If you're upgrading from an older version, ensure you are upgrading to at least version 12.0.4. If you are unable to upgrade in a timely fashion, the following patch can be applied: https://github.com/opf/openproject/pull/9983.patch
CVE-2021-44350 1 Thinkphp 1 Thinkphp 2021-12-20 7.5 HIGH 9.8 CRITICAL
SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php.
CVE-2021-43822 1 Jackalope Doctrine-dbal Project 1 Jackalope Doctrine-dbal 2021-12-17 6.8 MEDIUM 7.5 HIGH
Jackalope Doctrine-DBAL is an implementation of the PHP Content Repository API (PHPCR) using a relational database to persist data. In affected versions users can provoke SQL injections if they can specify a node name or query. Upgrade to version 1.7.4 to resolve this issue. If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.
CVE-2018-18805 1 Pointofsales Project 1 Pointofsales 2021-12-17 7.5 HIGH 9.8 CRITICAL
Point Of Sales 1.0 allows SQL injection via the login screen, related to LoginForm1.vb.
CVE-2021-44966 1 Employee Record Management System Project 1 Employee Record Management System 2021-12-17 10.0 HIGH 9.8 CRITICAL
SQL injection bypass authentication vulnerability in PHPGURUKUL Employee Record Management System 1.2 via index.php. An attacker can log in as an admin account of this system and can destroy, change or manipulate all sensitive information on the system.
CVE-2021-24863 1 Stopbadbots 1 Block And Stop Bad Bots 2021-12-16 7.5 HIGH 9.8 CRITICAL
The WP Block and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection Plugin StopBadBots WordPress plugin before 6.67 does not sanitise and escape the User Agent before using it in a SQL statement to save it, leading to a SQL injection
CVE-2021-40578 1 Online Enrollment Management System Project 1 Online Enrollment Management System 2021-12-16 6.5 MEDIUM 7.2 HIGH
Authenticated Blind & Error-based SQL injection vulnerability was discovered in Online Enrollment Management System in PHP and PayPal Free Source Code 1.0, that allows attackers to obtain sensitive information and execute arbitrary SQL commands via IDNO parameter.
CVE-2021-42668 1 Engineers Online Portal Project 1 Engineers Online Portal 2021-12-16 7.5 HIGH 9.8 CRITICAL
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.
CVE-2021-42064 1 Sap 1 Commerce 2021-12-16 6.8 MEDIUM 9.8 CRITICAL
If configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized "in" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized "in" clause accepts more than 1000 values.
CVE-2021-24861 1 Quotes Collection Project 1 Quotes Collection 2021-12-16 6.5 MEDIUM 7.2 HIGH
The Quotes Collection WordPress plugin through 2.5.2 does not validate and escape the bulkcheck parameter before using it in a SQL statement, leading to a SQL injection
CVE-2021-44026 3 Debian, Fedoraproject, Roundcube 3 Debian Linux, Fedora, Webmail 2021-12-16 7.5 HIGH 9.8 CRITICAL
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
CVE-2021-24951 1 Thimpress 1 Learnpress 2021-12-16 7.5 HIGH 9.8 CRITICAL
The LearnPress WordPress plugin before 4.1.4 does not sanitise, validate and escape the id parameter before using it in SQL statements when duplicating course/lesson/quiz/question, leading to SQL Injections issues
CVE-2021-42945 1 Zzcms 1 Zzcms 2021-12-15 7.5 HIGH 9.8 CRITICAL
A SQL Injection vulnerability exists in ZZCMS 2021 via the askbigclassid parameter in /admin/ask.php.
CVE-2021-45014 1 Taogogo 1 Taocms 2021-12-15 7.5 HIGH 9.8 CRITICAL
There is an upload sql injection vulnerability in the background of taocms 3.0.2 in parameter id:action=cms&ctrl=update&id=26