Total
12999 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-48585 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “admin brand portal” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48586 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “json walker” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48587 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “schedule editor” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48588 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “schedule editor decoupled” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48589 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “reporting job editor” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48590 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “admin dynamic app mib errors” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48591 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48592 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the vendor_country parameter of the “vendor print report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48593 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “topology data service” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48595 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “ticket template watchers” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48596 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “ticket queue watchers” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48597 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “ticket event report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2024-44349 | 1 Anteeowms | 1 Anteeowms | 2024-10-10 | 9.8 Critical |
A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB. | ||||
CVE-2024-43918 | 1 Woobewoo | 2 Product Table, Product Table Pro | 2024-10-10 | 10 Critical |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4. | ||||
CVE-2024-8911 | 1 Latepoint | 1 Latepoint | 2024-10-10 | 9.8 Critical |
The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified. | ||||
CVE-2024-9286 | 1 Trtek Software | 1 Distant Education Platform | 2024-10-10 | 0 Low |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), Improper Input Validation vulnerability in TRtek Software Distant Education Platform allows SQL Injection, Parameter Injection.This issue affects Distant Education Platform: before 3.2024.11. | ||||
CVE-2024-47334 | 2024-10-10 | 7.6 High | ||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Flow Zoho Flow for WordPress allows SQL Injection.This issue affects Zoho Flow for WordPress: from n/a through 2.7.1. | ||||
CVE-2022-48594 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “ticket watchers email” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48602 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “message viewer print” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | ||||
CVE-2022-48603 | 1 Sciencelogic | 1 Sl1 | 2024-10-10 | 8.8 High |
A SQL injection vulnerability exists in the “message viewer iframe” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. |