Export limit exceeded: 326181 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 326181 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (17416 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2023-34975 | 1 Qnap | 1 Video Station | 2026-01-12 | 6.6 Medium |
| An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. QuTScloud is not affected. We have already fixed the vulnerability in the following versions: QuTS hero h4.5.4.2626 build 20231225 and later QTS 4.5.4.2627 build 20231225 and later | ||||
| CVE-2024-9828 | 1 Taskbuilder | 1 Taskbuilder | 2026-01-09 | 4.1 Medium |
| The Taskbuilder WordPress plugin before 3.0.5 does not sanitize user input into the 'load_orders' parameter and uses it in a SQL statement, allowing high privilege users such as admin to perform SQL Injection attacks | ||||
| CVE-2024-39037 | 1 Airc | 1 Mynet | 2026-01-08 | 6.5 Medium |
| MyNET up to v26.08.316 was discovered to contain an Unauthenticated SQL Injection vulnerability via the intmenu parameter. | ||||
| CVE-2025-12287 | 1 Bdtask | 2 Wholesale, Wholesale Inventory Control And Inventory Management System | 2026-01-07 | 4.7 Medium |
| A security vulnerability has been detected in Bdtask Wholesale Inventory Control and Inventory Management System up to 20251013. This impacts an unknown function of the file /Admin_dashboard/edit_profile. Such manipulation of the argument first_name/last_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-57521 | 1 Ruoyi | 1 Ruoyi | 2026-01-06 | 10 Critical |
| SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java. | ||||
| CVE-2025-65354 | 1 Puneethreddyhc | 1 Event Management | 2026-01-06 | 9.8 Critical |
| Improper input handling in /Grocery/search_products_itname.php inPuneethReddyHC event-management 1.0 permits SQL injection via the sitem_name POST parameter. Crafted payloads can alter query logic and disclose database contents. Exploitation may result in sensitive data disclosure and backend compromise. | ||||
| CVE-2025-66440 | 1 Frappe | 1 Erpnext | 2026-01-05 | 9.8 Critical |
| An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext/accounts/doctype/payment_entry/payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the to_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding. | ||||
| CVE-2025-66439 | 1 Frappe | 1 Erpnext | 2026-01-05 | 9.8 Critical |
| An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext.accounts.doctype.payment_entry.payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the from_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding. | ||||
| CVE-2023-53975 | 1 Thedigitalcraft | 1 Atomcms | 2026-01-05 | 7.5 High |
| Atom CMS 2.0 contains an unauthenticated SQL injection vulnerability that allows remote attackers to manipulate database queries through unvalidated parameters. Attackers can inject malicious SQL code in the 'id' parameter of the admin index page to execute time-based blind SQL injection attacks. | ||||
| CVE-2025-68914 | 1 Riello-ups | 1 Netman 208 | 2026-01-02 | 6.5 Medium |
| Riello UPS NetMan 208 Application before 1.12 allows cgi-bin/login.cgi username SQL Injection. For example, an attacker can delete the LOGINFAILEDTABLE table. | ||||
| CVE-2025-67285 | 2 Angeljudesuarez, Itsourcecode | 2 Covid Tracking System Using Qr-code, Covid Tracking System | 2026-01-02 | 7.3 High |
| A SQL injection vulnerability was found in the '/cts/admin/?page=zone' file of ITSourcecode COVID Tracking System Using QR-Code v1.0. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation. | ||||
| CVE-2024-44065 | 2 Cloudlog, Magicbug | 2 Cloudlog, Cloudlog | 2025-12-31 | 9.8 Critical |
| Time-based blind SQL Injection vulnerability in Cloudlog v2.6.15 at the endpoint /index.php/logbookadvanced/search in the qsoresults parameter. | ||||
| CVE-2025-46268 | 1 Advantech | 2 Webaccess/scada, Webaccess\/scada | 2025-12-31 | 6.3 Medium |
| Advantech WebAccess/SCADA is vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands. | ||||
| CVE-2025-63948 | 2 Craigtaub, Phpmsadmin | 2 Phpmsadmin, Phpmsadmin | 2025-12-31 | 5.4 Medium |
| A SQL Injection vulnerability exists in phpMsAdmin version 2.2 in the database_mode.php file. An attacker can execute arbitrary SQL commands via the dbname parameter, potentially leading to information disclosure or database manipulation. | ||||
| CVE-2023-53917 | 1 Powerstonegh | 1 Affiliate Me | 2025-12-31 | 6.5 Medium |
| Affiliate Me version 5.0.1 contains a SQL injection vulnerability in the admin.php endpoint that allows authenticated administrators to manipulate database queries. Attackers can exploit the 'id' parameter with crafted union-based queries to extract sensitive user information including usernames and password hashes. | ||||
| CVE-2024-58308 | 1 Opensolution | 2 Quick.cms, Quick Cms | 2025-12-31 | 9.8 Critical |
| Quick.CMS 6.7 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating the login form. Attackers can inject specific SQL payloads like ' or '1'='1 to gain unauthorized administrative access to the system. | ||||
| CVE-2021-47720 | 1 Orangescrum | 1 Orangescrum | 2025-12-31 | 7.1 High |
| Orangescrum 1.8.0 contains an authenticated SQL injection vulnerability that allows authorized users to manipulate database queries through multiple vulnerable parameters. Attackers can inject malicious SQL code into parameters like old_project_id, project_id, uuid, and uniqid to potentially extract or modify database information. | ||||
| CVE-2025-66947 | 1 Krishanmurariji | 1 Student Management System | 2025-12-31 | 6.5 Medium |
| SQL injection vulnerability in krishanmuraiji SMS v.1.0, within the /studentms/admin/edit-class-detail.php via the editid GET parameter. An attacker can trigger controlled delays using SQL SLEEP() to infer database contents. Successful exploitation may lead to full database compromise, especially within an administrative module. | ||||
| CVE-2025-4362 | 1 Admerc | 1 Gym Management System | 2025-12-31 | 7.3 High |
| A vulnerability classified as critical was found in itsourcecode Gym Management System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_membership. The manipulation of the argument member_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-14652 | 2 Admerc, Itsourcecode | 2 Online Cake Ordering System, Online Cake Ordering System | 2025-12-31 | 7.3 High |
| A vulnerability was found in itsourcecode Online Cake Ordering System 1.0. This issue affects some unknown processing of the file /admindetail.php?action=edit. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. | ||||