Filtered by vendor
Subscriptions
Total
16423 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-43608 | 1 Doctrine-project | 1 Database Abstraction Layer | 2024-11-21 | 9.8 Critical |
Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API. | ||||
CVE-2021-43510 | 1 Simple Client Management System Project | 1 Simple Client Management System | 2024-11-21 | 9.8 Critical |
SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the username field in login.php. | ||||
CVE-2021-43509 | 1 Simple Client Management System Project | 1 Simple Client Management System | 2024-11-21 | 9.8 Critical |
SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the id parameter in view-service.php. | ||||
CVE-2021-43506 | 1 Simple Client Management System Project | 1 Simple Client Management System | 2024-11-21 | 9.8 Critical |
An SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the password parameter in Login.php. | ||||
CVE-2021-43484 | 1 Simple Client Management System Project | 1 Simple Client Management System | 2024-11-21 | 9.8 Critical |
A Remote Code Execution (RCE) vulnerability exists in Simple Client Management System 1.0 in create.php due to the failure to validate the extension of the file being sent in a request. | ||||
CVE-2021-43481 | 1 Webtareas Project | 1 Webtareas | 2024-11-21 | 9.8 Critical |
An SQL Injection vulnerability exists in Webtareas 2.4p3 and earlier via the $uq HTTP POST parameter in editapprovalstage.php. | ||||
CVE-2021-43451 | 1 Phpgurukul | 1 Employee Record Management System | 2024-11-21 | 9.8 Critical |
SQL Injection vulnerability exists in PHPGURUKUL Employee Record Management System 1.2 via the Email POST parameter in /forgetpassword.php. | ||||
CVE-2021-43420 | 1 Online Payment Hub Project | 1 Online Payment Hub | 2024-11-21 | 9.8 Critical |
SQL injection vulnerability in Login.php in Sourcecodester Online Payment Hub v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter. | ||||
CVE-2021-43408 | 1 Duplicate Post Project | 1 Duplicate Post | 2024-11-21 | 6.5 Medium |
The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles. | ||||
CVE-2021-43329 | 1 Mumara | 1 Classic | 2024-11-21 | 9.8 Critical |
A SQL injection vulnerability in license_update.php in Mumara Classic through 2.93 allows a remote unauthenticated attacker to execute arbitrary SQL commands via the license parameter. | ||||
CVE-2021-43157 | 1 Projectworlds | 1 Online Shopping System In Php | 2024-11-21 | 9.8 Critical |
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. | ||||
CVE-2021-43155 | 1 Projectworlds | 1 Online Book Store Project In Php | 2024-11-21 | 9.8 Critical |
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php. | ||||
CVE-2021-43130 | 1 Customer Relationship Management System Project | 1 Customer Relationship Management System | 2024-11-21 | 9.8 Critical |
An SQL Injection vulnerability exists in Sourcecodester Customer Relationship Management System (CRM) 1.0 via the username parameter in customer/login.php. | ||||
CVE-2021-43109 | 1 Puneethreddyhc Online-shopping-system Project | 1 Puneethreddyhc Online-shopping-system | 2024-11-21 | 7.5 High |
An SQL Injection vulnerability exits in PuneethReddyHC online-shopping-system as of 11/01/2021 via the p parameter in product.php. | ||||
CVE-2021-43094 | 1 Openmrs | 2 Openmrs, Reference Application | 2024-11-21 | 9.8 Critical |
An SQL Injection vulnerability exists in OpenMRS Reference Application Standalone Edition <=2.11 and Platform Standalone Edition <=2.4.0 via GET requests on arbitrary parameters in patient.page. | ||||
CVE-2021-43091 | 1 Yeswiki | 1 Yeswiki | 2024-11-21 | 7.5 High |
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. | ||||
CVE-2021-43077 | 1 Fortinet | 1 Fortiwlm | 2024-11-21 | 8.8 High |
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the AP monitor handlers. | ||||
CVE-2021-43035 | 1 Kaseya | 1 Unitrends Backup | 2024-11-21 | 9.8 Critical |
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Two unauthenticated SQL injection vulnerabilities were discovered, allowing arbitrary SQL queries to be injected and executed under the postgres superuser account. Remote code execution was possible, leading to full access to the postgres user account. | ||||
CVE-2021-43010 | 1 Safedog | 1 Safedog Apache | 2024-11-21 | 7.5 High |
In Safedog Apache v4.0.30255, attackers can bypass this product for SQL injection. Attackers can bypass access to sensitive data. | ||||
CVE-2021-42945 | 1 Zzcms | 1 Zzcms | 2024-11-21 | 9.8 Critical |
A SQL Injection vulnerability exists in ZZCMS 2021 via the askbigclassid parameter in /admin/ask.php. |