Total
17334 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-13555 | 1 Campcodes | 1 School File Management System | 2025-12-02 | 7.3 High |
| A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used. | ||||
| CVE-2025-13567 | 2 Angeljudesuarez, Itsourcecode | 2 Covid Tracking System, Covid Tracking System | 2025-12-02 | 6.3 Medium |
| A vulnerability was detected in itsourcecode COVID Tracking System 1.0. This affects an unknown function of the file /admin/?page=establishment. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. | ||||
| CVE-2025-13568 | 2 Angeljudesuarez, Itsourcecode | 2 Covid Tracking System, Covid Tracking System | 2025-12-02 | 6.3 Medium |
| A flaw has been found in itsourcecode COVID Tracking System 1.0. This impacts an unknown function of the file /admin/?page=people. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. | ||||
| CVE-2025-13569 | 2 Angeljudesuarez, Itsourcecode | 2 Covid Tracking System, Covid Tracking System | 2025-12-02 | 6.3 Medium |
| A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/?page=city. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-13570 | 2 Angeljudesuarez, Itsourcecode | 2 Covid Tracking System, Covid Tracking System | 2025-12-02 | 6.3 Medium |
| A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=state. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used. | ||||
| CVE-2025-13571 | 2 Code-projects, Fabian | 2 Simple Food Ordering System, Simple Cafe Ordering System | 2025-12-02 | 6.3 Medium |
| A vulnerability was determined in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /listorder.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. | ||||
| CVE-2025-13572 | 1 Projectworlds | 1 Advanced Library Management System | 2025-12-02 | 7.3 High |
| A vulnerability was identified in projectworlds Advanced Library Management System 1.0. This affects an unknown part of the file /delete_admin.php. The manipulation of the argument admin_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. | ||||
| CVE-2025-13575 | 2 Code-projects, Fabian | 2 Eblog Site, Blog Site | 2025-12-02 | 6.3 Medium |
| A security vulnerability has been detected in code-projects Blog Site 1.0. Impacted is the function category_exists of the file /resources/functions/blog.php of the component Category Handler. Such manipulation of the argument name/field leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. Multiple endpoints are affected. | ||||
| CVE-2025-13579 | 1 Code-projects | 1 Library System | 2025-12-02 | 6.3 Medium |
| A vulnerability was found in code-projects Library System 1.0. This impacts an unknown function of the file /return.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. | ||||
| CVE-2025-13580 | 1 Code-projects | 1 Library System | 2025-12-02 | 6.3 Medium |
| A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. | ||||
| CVE-2025-13582 | 2 Anisha, Code-projects | 2 Jonnys Liquor, Jonnys Liquor | 2025-12-02 | 7.3 High |
| A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. | ||||
| CVE-2025-13583 | 2 Carmelo, Code-projects | 2 Question Paper Generator, Question Paper Generator | 2025-12-02 | 7.3 High |
| A weakness has been identified in code-projects Question Paper Generator 1.0. This affects an unknown part of the file /signupscript.php of the component POST Parameter Handler. Executing manipulation of the argument Fname can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. | ||||
| CVE-2025-13586 | 2 Senior-walter, Sourcecodester | 2 Online Student Clearance System, Online Student Clearance System | 2025-12-02 | 4.7 Medium |
| A flaw has been found in SourceCodester Online Student Clearance System 1.0. Impacted is an unknown function of the file /Admin/changepassword.php. This manipulation of the argument txtconfirm_password causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. | ||||
| CVE-2025-52664 | 2 Revive, Revive-adserver | 2 Adserver, Revive Adserver | 2025-12-01 | 8.8 High |
| SQL injection in Revive Adserver 6.0.0 causes potential disruption or information access when specifically crafted payloads are sent by logged in users | ||||
| CVE-2025-13581 | 2 Facebook-julykringcadayona, Itsourcecode | 2 Student Information System, Student Information Management System | 2025-12-01 | 6.3 Medium |
| A vulnerability was identified in itsourcecode Student Information System 1.0. Affected by this vulnerability is an unknown functionality of the file /schedule_edit1.php. Such manipulation of the argument schedule_id leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. | ||||
| CVE-2025-13370 | 1 Wordpress | 1 Wordpress | 2025-12-01 | 4.9 Medium |
| The ProjectList plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 0.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
| CVE-2025-13770 | 1 Uniong | 1 Webitr | 2025-12-01 | 6.5 Medium |
| WebITR developed by Uniong has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents. | ||||
| CVE-2025-13769 | 1 Uniong | 1 Webitr | 2025-12-01 | 6.5 Medium |
| WebITR developed by Uniong has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents. | ||||
| CVE-2025-61167 | 1 Sigb | 1 Pmb | 2025-12-01 | 6.5 Medium |
| SIGB PMB v8.0.1.14 was discovered to contain multiple SQL injection vulnerabilities in the /opac_css/ajax_selector.php component via the id and datas parameters. | ||||
| CVE-2025-34038 | 2 Weaver, Weiphp | 2 E-cology, Weiphp | 2025-11-29 | 7.5 High |
| A SQL injection vulnerability exists in Fanwei e-cology 8.0 via the getdata.jsp endpoint. The application directly passes unsanitized user input from the sql parameter into a database query within the getSelectAllIds(sql, type) method, reachable through the cmd=getSelectAllId workflow in the AjaxManager. This allows unauthenticated attackers to execute arbitrary SQL queries, potentially exposing sensitive data such as administrator password hashes. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC. | ||||