Show filters
870 Total Results
Displaying 11-20 of 870
Sort by:
Attacker Value
Unknown

CVE-2020-29574

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.
Attacker Value
Very Low

CVE-2020-11530

Disclosure Date: May 08, 2020 (last updated February 21, 2025)
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
Attacker Value
Moderate

CVE-2019-20361

Disclosure Date: January 08, 2020 (last updated February 21, 2025)
There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).
Attacker Value
Very High

CVE-2021-20016

Disclosure Date: February 04, 2021 (last updated February 22, 2025)
A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.
Attacker Value
Very High

CVE-2020-10548

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10546

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10547

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Very High

CVE-2020-10549

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
Attacker Value
Unknown

CVE-2020-9465

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
Attacker Value
Very Low

CVE-2020-9340

Disclosure Date: February 22, 2020 (last updated February 21, 2025)
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter.