Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2017-20124: Offensive Security’s Exploit Database Archive

A vulnerability classified as critical has been found in Online Hotel Booking System Pro Plugin 1.0. Affected is an unknown function of the file /front/roomtype-details.php. The manipulation of the argument tid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE
#sql#vulnerability#web#google#linux#wordpress#php#auth
Fruits-Bazar 2021 1.0 SQL Injection

Fruits-Bazar 2021 version 1.0 suffers from a remote SQL injection vulnerability.

Laundry Management System 1.0 SQL Injection

Laundry Management System version 1.0 suffers from a remote SQL injection vulnerability.

CVE-2022-2073: Fixed Twig `|filter()` allowing code execution · getgrav/grav@9d6a2db

Code Injection in GitHub repository getgrav/grav prior to 1.7.34.

CVE-2022-33061: bug_report/SQLi-9.md at main · k0xx11/bug_report

Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_service.

CVE-2022-33060: bug_report/SQLi-8.md at main · k0xx11/bug_report

Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_schedule.

CVE-2022-33058: bug_report/SQLi-6.md at main · k0xx11/bug_report

Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_message.

CVE-2022-33057: bug_report/SQLi-5.md at main · k0xx11/bug_report

Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_reservation.

CVE-2022-33059: bug_report/SQLi-7.md at main · k0xx11/bug_report

Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_train.

CVE-2022-31058: request #27166: Naming a field "id" breaks the report · Enalean/tuleap@b91bcd5

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue.