Export limit exceeded: 16271 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (17982 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-41678 | 1 Mbconnectline | 2 Mbnet.mini, Mbnet.mini Firmware | 2025-11-06 | 6.5 Medium |
| A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement. | ||||
| CVE-2024-37848 | 2 Angeljudesuarez, Itsource | 2 Online Book Store Project, Online Bookstore Project | 2025-11-05 | 8.4 High |
| SQL Injection vulnerability in Online-Bookstore-Project-In-PHP v1.0 allows a local attacker to execute arbitrary code via the admin_delete.php component. | ||||
| CVE-2017-18362 | 1 Connectwise | 1 Manageditsync | 2025-11-05 | 9.8 Critical |
| ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication. | ||||
| CVE-2025-12614 | 2 Mayurik, Sourcecodester | 2 Best House Rental Management System, Best House Rental Management System | 2025-11-05 | 4.7 Medium |
| A weakness has been identified in SourceCodester Best House Rental Management System 1.0. Impacted is the function delete_payment of the file /admin_class.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. | ||||
| CVE-2025-12608 | 2 Angeljudesuarez, Itsourcecode | 2 Online Loan Management System, Online Loan Management System | 2025-11-05 | 7.3 High |
| A security flaw has been discovered in itsourcecode Online Loan Management System 1.0. The affected element is an unknown function of the file /manage_user.php. Performing manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. | ||||
| CVE-2025-12607 | 2 Angeljudesuarez, Itsourcecode | 2 Online Loan Management System, Online Loan Management System | 2025-11-05 | 7.3 High |
| A vulnerability was identified in itsourcecode Online Loan Management System 1.0. Impacted is an unknown function of the file /manage_payment.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. | ||||
| CVE-2025-12606 | 2 Angeljudesuarez, Itsourcecode | 2 Online Loan Management System, Online Loan Management System | 2025-11-05 | 7.3 High |
| A vulnerability was determined in itsourcecode Online Loan Management System 1.0. This issue affects some unknown processing of the file /manage_borrower.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. | ||||
| CVE-2025-12605 | 2 Angeljudesuarez, Itsourcecode | 2 Online Loan Management System, Online Loan Management System | 2025-11-05 | 7.3 High |
| A vulnerability was found in itsourcecode Online Loan Management System 1.0. This vulnerability affects unknown code of the file /manage_loan.php. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. | ||||
| CVE-2025-12604 | 2 Angeljudesuarez, Itsourcecode | 2 Online Loan Management System, Online Loan Management System | 2025-11-05 | 7.3 High |
| A vulnerability has been found in itsourcecode Online Loan Management System 1.0. This affects an unknown part of the file /load_fields.php. The manipulation of the argument loan_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-12598 | 2 Mayurik, Sourcecodester | 2 Best House Rental Management System, Best House Rental Management System | 2025-11-05 | 4.7 Medium |
| A flaw has been found in SourceCodester Best House Rental Management System 1.0. Affected by this issue is the function save_tenant of the file /admin_class.php. Executing manipulation of the argument firstname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. Other parameters might be affected as well. | ||||
| CVE-2025-12597 | 2 Mayurik, Sourcecodester | 2 Best House Rental Management System, Best House Rental Management System | 2025-11-05 | 4.7 Medium |
| A vulnerability was detected in SourceCodester Best House Rental Management System 1.0. Affected by this vulnerability is the function save_category of the file /admin_class.php. Performing manipulation of the argument Name results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used. | ||||
| CVE-2024-23494 | 1 Deltaww | 1 Diaenergie | 2025-11-05 | 8.8 High |
| SQL injection vulnerability exists in GetDIAE_unListParameters. | ||||
| CVE-2024-28891 | 1 Deltaww | 1 Diaenergie | 2025-11-05 | 8.8 High |
| SQL injection vulnerability exists in the script Handler_CFG.ashx. | ||||
| CVE-2024-23975 | 1 Deltaww | 1 Diaenergie | 2025-11-05 | 8.8 High |
| SQL injection vulnerability exists in GetDIAE_slogListParameters. | ||||
| CVE-2024-28040 | 1 Deltaww | 1 Diaenergie | 2025-11-05 | 8.8 High |
| SQL injection vulnerability exists in GetDIAE_astListParameters. | ||||
| CVE-2025-9943 | 1 Shibboleth | 1 Service Provider | 2025-11-04 | 9.1 Critical |
| An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0. | ||||
| CVE-2025-59681 | 1 Djangoproject | 1 Django | 2025-11-04 | 7.1 High |
| An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB). | ||||
| CVE-2025-57833 | 1 Djangoproject | 1 Django | 2025-11-04 | 7.1 High |
| An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias(). | ||||
| CVE-2025-55674 | 1 Apache | 1 Superset | 2025-11-04 | 6.5 Medium |
| A bypass of the DISALLOWED_SQL_FUNCTIONS security feature in Apache Superset allows for the execution of blocked SQL functions. An attacker can use a special inline block to circumvent the denylist. This allows a user with SQL Lab access to execute functions that were intended to be disabled, leading to the disclosure of sensitive database information like the software version. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue. | ||||
| CVE-2025-1735 | 1 Php | 1 Php | 2025-11-04 | 5.9 Medium |
| In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid. | ||||