Total
14138 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-0821 | 1 Bitapps | 1 Bit Assist | 2025-02-25 | 6.5 Medium |
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2025-1356 | 1 Needyamin | 1 Library Card System | 2025-02-25 | 6.3 Medium |
A vulnerability was found in needyamin Library Card System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file card.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-11260 | 1 Pixelite | 1 Events Manager | 2025-02-25 | 7.5 High |
The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the active_status parameter in all versions up to, and including, 6.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2024-12276 | 1 Ultimatemember | 1 Ultimate Member | 2025-02-25 | 5.3 Medium |
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to second-order SQL Injection via filenames in all versions up to, and including, 2.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with access to upload files and manage filenames through a third-party plugin like a File Manager, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The risk of this vulnerability is very minimal as it requires a user to be able to manipulate filenames in order to successfully exploit. | ||||
CVE-2024-13713 | 1 Wpexperts | 1 Givewp Square | 2025-02-25 | 6.5 Medium |
The WPExperts Square For GiveWP plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2024-13846 | 1 Wpindeed | 1 Ultimate Learning Pro | 2025-02-25 | 4.9 Medium |
The Indeed Ultimate Learning Pro plugin for WordPress is vulnerable to time-based SQL Injection via the ‘post_id’ parameter in all versions up to, and including, 3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2025-27133 | 2025-02-24 | N/A | ||
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue. | ||||
CVE-2024-54820 | 2025-02-24 | 9.8 Critical | ||
XOne Web Monitor v02.10.2024.530 framework 1.0.4.9 was discovered to contain a SQL injection vulnerability in the login page. This vulnerability allows attackers to extract all usernames and passwords via a crafted input. | ||||
CVE-2025-25876 | 2025-02-24 | 7.2 High | ||
A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /delete.php. The attack can use SQL injection to obtain sensitive data. | ||||
CVE-2024-12918 | 2025-02-24 | 8.8 High | ||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Health4All allows SQL Injection.This issue affects Health4All: before 10.01.2025. | ||||
CVE-2025-27312 | 2025-02-24 | 8.5 High | ||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jenst WP Sitemap allows SQL Injection. This issue affects WP Sitemap: from n/a through 1.0. | ||||
CVE-2025-1197 | 1 Fabianros | 1 Real Estate Property Management System | 2025-02-24 | 6.3 Medium |
A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /_parse/load_user-profile.php. The manipulation of the argument userhash leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-27297 | 2025-02-24 | 7.6 High | ||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in guelben Bravo Search & Replace allows Blind SQL Injection. This issue affects Bravo Search & Replace: from n/a through 1.0. | ||||
CVE-2024-12916 | 2025-02-24 | 8.8 High | ||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Life4All allows SQL Injection.This issue affects Life4All: before 10.01.2025. | ||||
CVE-2025-1582 | 2025-02-24 | 6.3 Medium | ||
A vulnerability was found in PHPGurukul Online Nurse Hiring System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/all-request.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2021-43140 | 1 Oretnom23 | 1 Simple Subscription Website | 2025-02-24 | 9.8 Critical |
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login. | ||||
CVE-2022-30053 | 1 Oretnom23 | 1 Toll Tax Management System | 2025-02-24 | 9.8 Critical |
In Toll Tax Management System 1.0, the id parameter appears to be vulnerable to SQL injection attacks. | ||||
CVE-2022-26283 | 1 Oretnom23 | 1 Simple Subscription Website | 2025-02-24 | 9.8 Critical |
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. | ||||
CVE-2022-34067 | 1 Oretnom23 | 1 Warehouse Management System | 2025-02-24 | 7.5 High |
Warehouse Management System v1.0 was discovered to contain a SQL injection vulnerability via the cari parameter. | ||||
CVE-2023-44047 | 1 Oretnom23 | 1 Toll Tax Management System | 2025-02-24 | 7.2 High |
Sourcecodester Toll Tax Management System v1 is vulnerable to SQL Injection. |