Total
15348 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-13230 | 1 Heateor | 1 Super Socializer | 2025-06-05 | N/A | 5.3 MEDIUM |
The Social Share, Social Login and Social Comments Plugin – Super Socializer plugin for WordPress is vulnerable to Limited SQL Injection via the ‘SuperSocializerKey’ parameter in all versions up to, and including, 7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional values into the already existing query that can be used to extract user metadata from the database. | |||||
CVE-2025-4332 | 1 Phpgurukul | 1 Company Visitor Management System | 2025-06-05 | 7.5 HIGH | 7.3 HIGH |
A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid/remark leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-3231 | 1 Phpgurukul | 1 Zoo Management System | 2025-06-05 | 7.5 HIGH | 7.3 HIGH |
A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. This issue affects some unknown processing of the file /aboutus.php. The manipulation of the argument pagetitle/pagedes leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4204 | 1 Auctionplugin | 1 Ultimate Wordpress Auction Plugin | 2025-06-04 | N/A | 7.5 HIGH |
The Ultimate Auction Pro plugin for WordPress is vulnerable to SQL Injection via the ‘auction_id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | |||||
CVE-2024-22625 | 1 Campcodes | 1 Supplier Management System | 2025-06-04 | N/A | 7.2 HIGH |
Complete Supplier Management System v1.0 is vulnerable to SQL Injection via /Supply_Management_System/admin/edit_category.php?id=. | |||||
CVE-2025-4353 | 2025-06-04 | 6.5 MEDIUM | 6.3 MEDIUM | ||
A vulnerability, which was classified as critical, was found in Brilliance Golden Link Secondary System up to 20250424. Affected is an unknown function of the file /paraframework/queryTsDictionaryType.htm. The manipulation of the argument dictCn1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4352 | 2025-06-04 | 6.5 MEDIUM | 6.3 MEDIUM | ||
A vulnerability, which was classified as critical, has been found in Brilliance Golden Link Secondary System up to 20250424. This issue affects some unknown processing of the file /reprotframework/tcEntrFlowSelect.htm. The manipulation of the argument custTradeId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-22626 | 1 Campcodes | 1 Supplier Management System | 2025-06-04 | N/A | 7.2 HIGH |
Complete Supplier Management System v1.0 is vulnerable to SQL Injection via /Supply_Management_System/admin/edit_retailer.php?id=. | |||||
CVE-2025-22206 | 1 Joomsky | 1 Js Jobs | 2025-06-04 | N/A | 4.7 MEDIUM |
A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.2 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'fieldfor' parameter in the GDPR Field feature. | |||||
CVE-2025-22208 | 1 Joomsky | 1 Js Jobs | 2025-06-04 | N/A | 4.7 MEDIUM |
A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'filter_email' parameter in the GDPR Erase Data Request search feature. | |||||
CVE-2025-22209 | 1 Joomsky | 1 Js Jobs | 2025-06-04 | N/A | 4.7 MEDIUM |
A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'searchpaymentstatus' parameter in the Employer Payment History search feature. | |||||
CVE-2025-22210 | 1 Hikashop | 1 Hikashop | 2025-06-04 | N/A | 7.2 HIGH |
A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend. | |||||
CVE-2025-25226 | 1 Joomla | 1 Joomla\! | 2025-06-04 | N/A | 9.8 CRITICAL |
Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used. | |||||
CVE-2025-4578 | 1 Dimdavid | 1 File Provider | 2025-06-04 | N/A | 9.8 CRITICAL |
The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection | |||||
CVE-2025-2248 | 1 Mantus667 | 1 Wp-pmanager | 2025-06-04 | N/A | 5.4 MEDIUM |
The WP-PManager WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks | |||||
CVE-2025-48912 | 1 Apache | 1 Superset | 2025-06-04 | N/A | 6.5 MEDIUM |
An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue. | |||||
CVE-2025-5576 | 1 Phpgurukul | 1 Dairy Farm Shop Management System | 2025-06-04 | 7.5 HIGH | 7.3 HIGH |
A vulnerability, which was classified as critical, has been found in PHPGurukul Dairy Farm Shop Management System 1.3. This issue affects some unknown processing of the file /bwdate-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5577 | 1 Phpgurukul | 1 Dairy Farm Shop Management System | 2025-06-04 | 7.5 HIGH | 7.3 HIGH |
A vulnerability, which was classified as critical, was found in PHPGurukul Dairy Farm Shop Management System 1.3. Affected is an unknown function of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5579 | 1 Phpgurukul | 1 Dairy Farm Shop Management System | 2025-06-04 | 7.5 HIGH | 7.3 HIGH |
A vulnerability was found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this issue is some unknown functionality of the file /search-product.php. The manipulation of the argument productname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5578 | 1 Phpgurukul | 1 Dairy Farm Shop Management System | 2025-06-04 | 7.5 HIGH | 7.3 HIGH |
A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sales-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |