Security
Headlines
HeadlinesLatestCVEs

Tag

#sql

CVE-2023-24217: Agilebio Lab Collector 4.234 Remote Code Execution ≈ Packet Storm

AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability.

CVE
#sql#vulnerability#web#git#php#rce#auth
GHSA-f46j-r7q3-6cm2: Moodle SQL Injection vulnerability

In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.

GHSA-qc86-vgf2-6fq6: Moodle SQL Injection vulnerability

In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses.

CVE-2021-36393

In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.

CVE-2023-24737: CVE/PMB at main · AetherBlack/CVE

PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950.php.

CVE-2023-26949: Remote code execution caused by uploading arbitrary files in the background · Issue #1 · keheying/onekeyadmin

An arbitrary file upload vulnerability in the component /admin1/config/update of onekeyadmin v1.3.9 allows attackers to execute arbitrary code via a crafted PHP file.

CVE-2021-36392

In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses.

CVE-2023-24763

In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0.

GHSA-qxpm-5ghc-6gc2: jeecg-boot contains SQL Injection vulnerability

jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.

CVE-2023-27474: Fix url encoding query parameters and added tests by tofran · Pull Request #17120 · directus/directus

Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.