Ibm sterling commerce 9.5 global inventory pdf download






















In phpMyAdmin 4 before 4. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server. In applications using Spring Cloud Task 2. In Spring Cloud Data Flow, versions 2. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to execute SQL commands to perform unauthorized actions. Leantime before versions 2.

The impact is high. Attackers can exfiltrate data like the users' and administrators' password hashes, modify data, or drop tables. In the code, the parameter is named "users" in class. This issue is fixed in versions 2. In Administrate rubygem before version 0. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0. IBM Security Guardium A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.

The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage. No way to breach confidentiality with this vulnerability is known. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized.

It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app. This is patched in versions 0. A malicious actor with tenant access to Velocloud Orchestrator could enter specially crafted SQL queries and obtain data to which they are not privileged.

Successful exploitation could lead to sensitive information disclosure. If exploited, the vulnerability allows remote attackers to obtain application information. QTS 4. CSE Bookstore version 1. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database on which the web application is running.

AppCMS 2. The id parameter in detail. Seat-Reservation-System 1. An issue was discovered in Cacti 1. This can lead to remote code execution. BigProf Online Invoicing System before 2. An unauthenticated attacker is able to send a request containing a crafted payload that can result in sensitive information being extracted from the database, eventually leading into an application takeover.

This vulnerability was introduced as a result of the developer trying to roll their own sanitization implementation in order to allow the application to be used in legacy environments. An issue was discovered in Joomla! Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.

SQL Injection in Classbooking before 2. ThinkSAAS before 3. Courier Management System 1. An attacker can able to access of Admin Panel and manage every account of Result.

The Online Marriage Registration System 1. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system.

A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database. A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker with administrative credentials to conduct SQL injection attacks on an affected system.

An attacker could exploit this vulnerability by authenticating to the web-based management interface and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data that is stored in the underlying database, including hashed user credentials.

To exploit this vulnerability, an attacker would need valid administrative credentials. A vulnerability in the web-based management interface for Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries.

The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.

A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. A vulnerability in the web-based management interface of Cisco Prime Collaboration Provisioning Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

The vulnerability exists because the web-based management interface improperly validates user input for specific SQL queries. An attacker could exploit this vulnerability by authenticating to the application with valid administrative credentials and sending malicious requests to an affected system.

A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, or delete information from the database that they are not authorized to delete.

The vulnerability exists because the web-based management interface improperly validates SQL values. An authenticated attacker could exploit this vulnerability sending malicious requests to the affected device. An exploit could allow the attacker to modify values on or return values from the underlying database. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database, causing unauthorized read and write access to application data.

Exploitation may lead to leakage or deletion of sensitive backup data; hence the severity is Critical. Dell EMC recommends customers to upgrade at the earliest opportunity.

An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution. The file view-chair-list. SQL injection vulnerability in BloodX 1. The Victor CMS v1. The vulnerability allows for an unauthenticated attacker to perform various tasks such as modifying and leaking all contents of the database. Chichen Tech CMS v1. In MantisBT 2.

SourceCodester Online Clothing Store 1. SourceCodester Library Management System 1. SourceCodester Alumni Management System 1. A user must be an authenticated manager in the dotCMS system to exploit this vulnerability. SQL injection vulnerability in request. The Loginizer plugin before 1. The serialnumber parameter in the getAssets. The componentStatus parameter in the getAssets. The assetStatus parameter in the getAssets.

The code parameter in the getAssets. The code parameter in the The nomenclature parameter in the getAssets. A remote denial of service attack can be performed. After that, some unexpected RAM data is read. An issue was discovered in Aptean Product Configurator 4. This can be exploited directly, and remotely. An issue was discovered in SearchController in phpMyAdmin before 4.

An attacker could use this flaw to inject malicious SQL in to a query. Restaurant Reservation System 1. REDCap The application uses the addition of a string of information from the submitted user that is not validated well in the database query, resulting in an SQL injection vulnerability where an attacker can exploit and compromise all databases.

Any user logged in to a vFairs 3. Damstra Smart Asset This allows forcing the database and server to initiate remote connections to third party DNS servers. In the PrestaShop module "productcomments" before version 4. The problem is fixed in 4. In TYPO3 before versions 9. Update to TYPO3 versions 9.

College Management System Php 1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. An issue was discovered in Hoosk CMS v1.

WebsiteBaker 2. By placing SQL injection payload on the login page attackers can bypass the authentication and can gain the admin privilege. The file front. An attacker can append SQL queries to the input to extract sensitive information from the database. The paGO Commerce plugin 2. The Reset Password add-on before 1.

A flaw was found in hibernate-core in versions prior to and including 5. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

The highest threat from this vulnerability is to data confidentiality and integrity. Projectsworlds College Management System Php 1.

The id paramater in Online Shopping Alphaware 1. This allows an attacker to retrieve all databases. An issue was discovered in Hyland OnBase The R-SeeNet webpage 1. Users are able to inject malicious statements in multiple functions. This vulnerability leads to full authentication bypass: any unauthorized user with access to the application is able to exploit this vulnerability. Authenticated users are able to inject malicious SQL queries.

This vulnerability leads to full database leak including ckeys that can be used in the authentication process without knowing the username and cleartext password. Heybbs v1. A SQL injection vulnerability in qcubed all versions including 3. A SQL injection vulnerability in zzzphp v1. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability. Mailtrain through 1. Mitel MiCloud Management Portal before 6.

There is a blind SQL injection in the knximport component via an advanced attack vector, allowing logged in attackers to discover arbitrary information. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information. This vulnerability could be exploited by an authenticated user with permissions to the product listing page to read data from the database.

SQL Injection vulnerability in eyoucms cms v1. DesignMasterEvents Conference management 1. Webexcels Ecommerce CMS 2. This parameter can be used by sqlmap to obtain data information in the database.

Projectworlds House Rental v1. SQL Injection vulnerability in Jianzhan v2. A blind SQL injection vulnerability exists in zzcms ver based on time cookie injection.

An issue was discovered in ming-soft MCMS v5. A SQL injection vulnerability in config. The dbName parameter in ajaxDbInstall.

An issue was dicovered in vtiger crm 7. Union sql injection in the calendar exportdata feature. Centreon Stivasoft Phpjabbers Fundraising Script v1. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information. OpenSNS v6. In fastadmin-tp6 v1. In fastadmin V1. Sql injection vulnerability in koa2-blog 1. SQL injection vulnerability in the model.

SQL Injection vulnerability in Metinfo 7. MetInfo 7. Pligg CMS 2. Sourcecodester Hotel and Lodge Management System 2. An issue was discovered in MetInfo v7. FlameCMS 3. GilaCMS v1. Nuishop v2. Sliced Invoices plugin for WordPress 3. R allows attackers to obtain sensitive database information. Remote attackers can exploit the vulnerability to obtain database sensitive information. SQL Injection vulnerability in imcat v5. A SQL injection vulnerability in the 4.

Sql injection vulnerability in the yccms 3. Wuzhi CMS v4. ThinkPHP v3. A SQL injection vulnerability has been discovered in zz cms version which allows attackers to retrieve sensitive data via the component subzs. A SQL injection vulnerability in admin. SQL injection exists in the jdownloads 3. Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.

This vulnerability allows attackers to access sensitive database information. SQL Injection in Rockoa v1. EDCMS v1. SQL Injection vulnerability in Metinfo 6. SQL Injection vulnerability exists in tp-shop 2. Artica Web Proxy 4.

PhpOK 5. No authentication is required. The injection point resides in one of the authentication parameters. In LibreNMS before 1. Re:Desk 2. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database.

Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability CVE A vulnerability has been identified in Desigo Insight All versions. The web service does not properly apply input validation for some query parameters in a reserved area.

This could allow an authenticated attacker to retrieve data via a content-based blind SQL injection attack. A remote authenticated attacker could send crafted SQL statements to the devices. Resultant authorization bypass is also possible, by recovering or modifying password hashes and password reset tokens, allowing for administrative privileges to be obtained. The Nexos theme through 1. Support Incident Tracker aka SiT!

In GLPI before version 9. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9. A proof-of-concept with technical details is available in the linked advisory. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more.

PrestaShop from version 1. The problem is fixed in 1. Ampache before version 4. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4. In glpi before 9. This has been fixed in 9. An issue was discovered in phpList through 3. An issue was discovered in Artica Proxy CE before 4. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation.

As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run.

Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in HpremPayRequest servlet's SortBy parameter allows an attacker with the Employee, Supervisor, or Timekeeper role to read sensitive data from the database. Advantech iView, versions 5. An attacker could extract user credentials, read or modify information, and remotely execute code. A SQL injection issue in color.

This can lead to remote command execution because the product accepts stacked queries. The DiveBook plugin 1. This affects versions before The J2Store plugin before 3. A blind time-based SQL injection issue allows remote unauthenticated attackers to retrieve information from the database via a ticket. Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible.

Users of all previous versions after 2. As an admin, an attacker can upload a PHP shell and execute remote code on the operating system. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.

An attacker can make authenticated HTTP requests to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery. SQL injection vulnerability exists in the handling of sort parameters in ProcessMaker 3. Parameter psClass in ednareporting.

An attacker can send unauthenticated HTTP requests to trigger this vulnerability. Parameter AttFilterValue in ednareporting. Jason AdminPanel 4. An issue was discovered in Mikrotik-Router-Monitoring-System through RainbowFish PacsOne Server 6. Gnuteca 3. PHP-Fusion 9. Ivanti Avalanche 6. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin s , portal admins, and user accounts used for remote access but not external Active Directory or LDAP passwords.

The Import feature in the wp-advanced-search plugin 3. An attacker can use this to execute SQL commands without any validation. Rukovoditel 2. An issue was discovered in Programi It has multiple SQL injection vulnerabilities. LibreHealth EMR v2. Exploiting this vulnerability requires a technician account. This is fixed in version 9. In Tortoise ORM before versions 0. SQL Injection was discovered in Admidio before version 3.

The vulnerability impacts the confidentiality of the system. This has been patched in version 3. NOTE: this product is discontinued. In phpMyAdmin 4. A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account such as editing its privileges.

The attacker must be able to insert crafted data into certain database tables, which when retrieved for instance, through the Browse tab can trigger the XSS attack. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

LogicalDoc before 8. LogicalDoc populates the list of available documents by querying the database. This list could be filtered by modifying some of the parameters. Some of them are not properly sanitized which could allow an authenticated attacker to perform arbitrary queries to the database. An issue was discovered in rConfig through 3.

The web interface is prone to a SQL injection via the commands. An issue was discovered in MunkiReport before 5. The verify endpoint in YubiKey Validation Server before 2. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. In query of SmsProvider. This could lead to local information disclosure with System execution privileges needed. An issue was discovered in the Harmis JE Messenger component 1.

Input does not get validated and queries are not written in a way to prevent SQL injection. Therefore arbitrary SQL-Statements can be executed in the database. RockOA 1. The vulnerability does not need any authentication.

BlueCMS 1. SQL injection vulnerability in the J2Store plugin 3. HotelDruid before v2. SQLiteManager 1. NOTE: This product is discontinued. GoRose v1. Kohana through 3. XAMPP through 5. ZoneMinder before 1. ZoneMinder through 1. A SQL injection vulnerability exists in Magento 2.

An authenticated user with access to email templates can send malicious SQL queries and obtain access to sensitive information stored in the database. A user with marketing privileges can execute arbitrary SQL queries in the database when accessing email template variables. A user with store manipulation privileges can execute arbitrary SQL queries by getting access to the database connection through group instance in email templates.

An authenticated user with privileges to an account with Newsletter Template editing permission could exfiltrate the Admin login data, and reset their password, effectively performing a privilege escalation. In webERP 4. Bo-blog Wind through 1. An issue was discovered in Waimai Super Cms An issue was discovered in baijiacms V4 that can result in time-based blind SQL injection to get data via the cate parameter in an index.

This vulnerability impacted SMA version 9. The userid parameter in jumpin. SQLAlchemy through 1. A SQL injection vulnerability in the reporting component of Avaya Control Manager could allow an unauthenticated attacker to execute arbitrary SQL commands and retrieve sensitive data related to other users on the system.

Affected versions of Avaya Control Manager include 7. Unsupported versions not listed here were not evaluated. An issue was discovered in phpMyAdmin before 4.

A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. SuiteCRM before 7. Cleanto 5. An issue was discovered in idreamsoft iCMS V7. An issue was discovered in XiaoCms SQL injection vulnerability in the Cybozu Garoon 4.

An issue was discovered in portier vision 4. Due to a lack of user input validation in parameter handling, it has various SQL injections, including on the login form, and on the search form for a key ring number.

All versions of SilverStripe 3 prior to 3. A specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. When the "VideoTags" plugin is enabled, a specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution.

Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.

An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.

An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

Specially crafted web request to login page can cause SQL injections, resulting in data compromise. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required. IBM Contract Management Pivotal Concourse version 5.

An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data. A remote authenticated malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the data by supplying specially crafted input data to the affected application.

The vulnerable code location is com. Product: AndroidVersions: Android WebChess 1. An issue was discovered in Mattermost Server before 5. This affects D before 1. An issue was discovered on Samsung mobile devices with N 7. There is time-based SQL injection in Contacts. An issue was discovered on Samsung mobile devices with P 9. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration.

This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. The SQL Injection type is Error-based this means that relies on error messages thrown by the database server to obtain information about the structure of the database. An issue was discovered in TYPO3 before 8. Because escaping of user-submitted content is mishandled, the class QueryGenerator is vulnerable to SQL injection.

Exploitation requires having the system extension ext:lowlevel installed, and a valid backend user who has administrator privileges. In Joomla! Octeth Oempro 4. The parameter CampaignID in Campaign. Get is vulnerable. A successful exploit could allow an attacker to extract sensitive information from the database and execute arbitrary scripts.

A vulnerability in the sponsor portal web interface for Cisco Identity Services Engine ISE could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. At the time of publication, this vulnerability affected Cisco ISE running software releases 2. An authenticated remote attacker could exploit this vulnerability to read or modify the CCS database and potentially execute administrative database operations or operating system commands.

The web interface could allow SQL injection attacks if an attacker is able to modify content of particular web pages.

Cloud Native Computing Foundation Harbor prior to 1. This could be used by an attacker to extract sensitive information from the appliance database. A SQL injection vulnerability in Redmine through 3. This can be exploited by malicious users to, e.

Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled. The Untangle NG firewall In TypeStack class-validator 0. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.

Sourcecodester Hotel and Lodge Management System 1. Sourcecodester Online Grading System 1. This vulnerability exist because the software improperly validates user-supplied input in SQL queries.

An attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the affected application.

A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data. Equinox Control Expert all versions, is vulnerable to an SQL injection attack, which may allow an attacker to remotely execute arbitrary code.

Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information. An issue was discovered in Centreon before 2. An issue was discovered in 74CMS v5. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated. An issue was discovered in idreamsoft iCMS v7.

An issue was discovered in MetInfo 7. Cacti through 1. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery. SugarCRM before 8. OpenEMR through 5. Netreo OmniCenter through The injection allows an attacker to read sensitive information from the database used by the application.

Multiple SQL injection vulnerabilities in Logs. A SQL injection vulnerability in processPref. In Metinfo 7. In FusionPBX up to v4. The uid and domain parameters are used, unsanitized, in a SQL query constructed in the buildSearchWhereClause function.

SQL injection vulnerabilities in Centreon through In Jobberbase 2. A successful exploit could allow the attacker to modify values on, or return values from, the underlying database as well as the operating system. The vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by entering malicious SQL statements in an affected field in the web UI.

A successful exploit could allow the attacker to remove the SQL database, which would require the reinstallation of the Connector VM. To exploit these vulnerabilities, an attacker would need administrative privileges on the DCNM application.

Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one.

A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database.

The LoginPress plugin before 1. The pie-register plugin before 3. BEdita through 4. The Alfresco application before 1. The Compassion Switzerland addons FlashLingo before allows SQL injection, related to flashlingo. The proxystatistics module before 3. A SQL injection vulnerability in the method Terrasoft. A problem was found in Centreon Web through The arId parameter is not properly filtered before being passed to the SQL query.

One can consequently upload a malicious file using the "Execute Program Action s " feature. The ninja-forms plugin before 3. An issue was discovered in imcat 4. There is SQL Injection via the index. An issue was discovered in Frappe Framework 10 through 12 before There exists an authenticated SQL injection. REDCap before 9.

The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data. A flaw was found in Hibernate ORM in versions before 5.

Open-School 3. An issue was discovered on MicroDigital N-series cameras with firmware through An attacker can, for example, create an admin account. The BearDev JoomSport plugin 3. An issue was discovered in Django 1. Due to an error in shallow key transformation, key and index lookups for django. JSONField, and key lookups for django. Ovidentia 8. Metinfo 6. In Umbraco 7. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.

An issue was discovered in Sertek Xpare 3. The login form does not sanitize input data. Because of this, a malicious agent could access the backend database via SQL injection. The Rencontre plugin before 3. After this is decoded, it is deserialized.

Then, this deserialized data goes directly into a SQL query, with no sanitizing checks. An issue was discovered in the VeronaLabs wp-statistics plugin before A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it.

If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting XSS. An authenticated user has the ability to execute arbitrary commands against the database.

OXID eShop 6. This includes all shopping cart options, customer data, and the database. No interaction between the attacker and the victim is necessary.

LiveZilla Server before 8. Elcom CMS before An issue was discovered in the Teclib Fields plugin through 1. An Attacker can carry a SQL Injection payload to the server, allowing the attacker to read privileged data. The vulnerability exists because the affected software improperly validates user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted requests that contain malicious SQL statements to the affected application.

A successful exploit could allow the attacker to determine the presence of certain values in the database, impacting the confidentiality of the system. Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center FMC Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device.

These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.

The slickquiz plugin through 1. An issue was discovered in LibreNMS 1. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files.

An issue was discovered in Ampache through 3. This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality. Petraware pTransformer ADC before 2. An issue was discovered in zzcms The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call.

The vendor tried re-creating the issue with no luck. The WP Booking System plugin 1. CommSy through 8. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature. A remote background administrator privilege user or a user with permission to manage emailing could exploit the vulnerability to obtain database sensitive information.

A remote background administrator privilege user or a user with permission to manage configuration siteweb could exploit the vulnerability to obtain database sensitive information. A remote background administrator privilege user or a user with permission to manage network configuration could exploit the vulnerability to obtain database sensitive information.

A remote background administrator privilege user or a user with permission to manage configuration analytics could exploit the vulnerability to obtain database sensitive information. A remote unauthorized attacker could exploit the vulnerability to obtain database sensitive information. A remote normal registered user could exploit the vulnerability to obtain database sensitive information.

The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access. An issue was discovered in AikCms v2. For example, the attacker can subsequently write arbitrary text to a. In Symfony before 2. In the Form Maker plugin before 1. Computrols CBAS Pixie versions 1. An attacker with limited privileges classes permission can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error based sql injection.

Sequelize, all versions prior to version 4. Sequelize all versions prior to 3. KBPublisher 6. An issue was discovered in LibreNMS through 1. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.

RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files. Domoticz before 4. Grandstream UCM before 1. An issue was discovered in Hsycms V1. Teclib GLPI through 9. A vulnerability was found in openstack-ironic-inspector all versions excluding 5. Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening.

Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service. The default user for the database is the 'sa' user.

SaltStack Salt It leads to RCE. The component is: The mysql. The attack vector is: specially crafted password string. The fixed version is: Synetics GmbH I-doit 1. The impact is: Unauthenticated mysql database access. The component is: Web login form. The fixed version is: 1. Jeesite 1. The impact is: sensitive information disclosure. The attack vector is: network connectivity,authenticated.

The fixed version is: 4. The impact is: The impact is a injection of any SQL queries when a user controller argument is added as a component. The component is: Affects users that add a component that is user controller, for instance a parameter or a header. The attack vector is: Hacker inputs a SQL to a vulnerable vector header, http parameter, etc. The impact is: sql inject. The impact is: zzcms File Delete to Code Execution. The impact is: Access to the database. The attack vector is: Crafted ajax request.

These individual forums were decommissioned on 31 May The questions from many of these forums were migrated to the IBM Support Forum and you can find them using the search mechanism or by choosing the product or topic tag.

In general, migration and sunset decisions were decided by the business area. Content that was not migrated was archived or retired. Much of the forum, wiki and community content was migrated to the IBM Support forums. The search field on the IBM Support forum will help you find the migrated content. For more information about the Support Transformation initiative, please follow the IBM Support Insider blog to learn more and to stay up to date. Sign In. Search Options. Skip to main content Press Enter.

Skip auxiliary navigation Press Enter. IBM Community Home. Welcome to the IBM Community Together, we can connect via forums, blogs, files and face-to-face networking.

Find your community. Skip main navigation Press Enter. Toggle navigation. Legacy Communities. You are in the right place. You are here because specific IBM developerWorks forums, blogs and other Connections content have been decommissioned.

This page will help you find the content you are looking for, get answers to your questions, and find a new community to call home. Where am I?



0コメント

  • 1000 / 1000