Total
18746 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2024-5225 | 1 Litellm | 1 Litellm | 2024-11-21 | 7.2 High |
| An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS). | ||||
| CVE-2024-4890 | 1 Litellm | 1 Litellm | 2024-11-21 | 4.9 Medium |
| A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14. | ||||
| CVE-2024-4145 | 1 Wp-media | 1 Search \& Replace | 2024-11-21 | 7.2 High |
| The Search & Replace WordPress plugin before 3.2.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network). | ||||
| CVE-2024-4071 | 1 Aditya88 | 1 Online Furniture Shopping Ecommerce Website | 2024-11-21 | 6.3 Medium |
| A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0 and classified as critical. This issue affects some unknown processing of the file prodInfo.php. The manipulation of the argument prodId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261797 was assigned to this vulnerability. | ||||
| CVE-2024-4070 | 2024-11-21 | 6.3 Medium | ||
| A vulnerability has been found in Kashipara Online Furniture Shopping Ecommerce Website 1.0 and classified as critical. This vulnerability affects unknown code of the file prodList.php. The manipulation of the argument prodType leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261796. | ||||
| CVE-2024-45999 | 2 Cloudlog, Magicbug | 2 Cloudlog, Cloudlog | 2024-11-21 | 6.6 Medium |
| A SQL Injection vulnerability was discovered in Cloudlog 2.6.15, specifically within the get_station_info()function located in the file /application/models/Oqrs_model.php. The vulnerability is exploitable via the station_id parameter. | ||||
| CVE-2024-41804 | 1 Xibosignage | 1 Xibo | 2024-11-21 | 6.5 Medium |
| Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API route inside the CMS responsible for Adding/Editing DataSet Column Formulas. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the `formula` parameter. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue. | ||||
| CVE-2024-41803 | 1 Xibosignage | 1 Xibo | 2024-11-21 | 4.9 Medium |
| Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain arbitrary data from the Xibo database by injecting specially crafted values in to the API for viewing DataSet data. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue. | ||||
| CVE-2024-41802 | 1 Xibosignage | 1 Xibo | 2024-11-21 | 8.1 High |
| Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the APIs for importing JSON and importing a Layout containing DataSet data. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue | ||||
| CVE-2024-41702 | 1 Siberiancms | 1 Siberiancms | 2024-11-21 | 9.8 Critical |
| SiberianCMS - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | ||||
| CVE-2024-41551 | 1 Campcodes | 1 Supplier Management System | 2024-11-21 | 7.3 High |
| CampCodes Supplier Management System v1.0 is vulnerable to SQL injection via Supply_Management_System/admin/view_order_items.php?id= . | ||||
| CVE-2024-40689 | 1 Ibm | 2 Infosphere Information Server, Infosphere Information Server On Cloud | 2024-11-21 | 6 Medium |
| IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. IBM X-Force ID: 297719. | ||||
| CVE-2024-40637 | 1 Getdbt | 1 Dbt Core | 2024-11-21 | 4.2 Medium |
| dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. When a user installs a package in dbt, it has the ability to override macros, materializations, and other core components of dbt. This is by design, as it allows packages to extend and customize dbt's functionality. However, this also means that a malicious package could potentially override these components with harmful code. This issue has been fixed in versions 1.8.0, 1.6.14 and 1.7.14. Users are advised to upgrade. There are no kn own workarounds for this vulnerability. Users updating to either 1.6.14 or 1.7.14 will need to set `flags.require_explicit_package_overrides_for_builtin_materializations: False` in their configuration in `dbt_project.yml`. | ||||
| CVE-2024-40542 | 2 Codermy, Witmy | 2 My-springsecurity-plus, My-springsecurity-plus | 2024-11-21 | 6.3 Medium |
| my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset. | ||||
| CVE-2024-40541 | 2 Codermy, Witmy | 2 My-springsecurity-plus, My-springsecurity-plus | 2024-11-21 | 6.2 Medium |
| my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build. | ||||
| CVE-2024-40540 | 1 Codermy | 1 My-springsecurity-plus | 2024-11-21 | 6.2 Medium |
| my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept. | ||||
| CVE-2024-40539 | 2 Codermy, Witmy | 2 My-springsecurity-plus, My-springsecurity-plus | 2024-11-21 | 6.2 Medium |
| my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/user. | ||||
| CVE-2024-40322 | 1 Jfinalcms Project | 1 Jfinalcms | 2024-11-21 | 6.3 Medium |
| An issue was discovered in JFinalCMS v.5.0.0. There is a SQL injection vulnerablity via /admin/div_data/data | ||||
| CVE-2024-3816 | 1 Conceptintermedia | 1 S\@m Cms | 2024-11-21 | 9.8 Critical |
| Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar. Only a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears. | ||||
| CVE-2024-3223 | 2024-11-21 | 6.3 Medium | ||
| A vulnerability, which was classified as critical, was found in SourceCodester PHP Task Management System 1.0. Affected is an unknown function of the file admin-manage-user.php. The manipulation of the argument admin_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259068. | ||||