VYPR

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

BaseStableLikelihood: High

Description

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Hierarchy (View 1000)

Parents

Children

Related attack patterns (CAPEC)

CAPEC-108 · CAPEC-109 · CAPEC-110 · CAPEC-470 · CAPEC-66 · CAPEC-7

CVEs mapped to this weakness (8,850)

page 105 of 443
  • CVE-2017-17567HigDec 13, 2017
    risk 0.49cvss 7.5epss 0.00

    Scubez Posty Readymade Classifieds has SQL Injection via the admin/user_activate_submit.php ID parameter.

  • CVE-2017-17102HigDec 4, 2017
    risk 0.49cvss 7.5epss 0.00

    Fiyo CMS 2.0.7 has SQL injection in /system/site.php via $_REQUEST['link'].

  • CVE-2017-1000129HigNov 17, 2017
    risk 0.49cvss 7.5epss 0.00

    Serendipity 2.0.3 is vulnerable to a SQL injection in the blog component resulting in information disclosure

  • CVE-2017-1002005HigSep 14, 2017
    risk 0.49cvss 7.5epss 0.05

    Vulnerability in wordpress plugin DTracker v1.5, In file ./dtracker/delete.php user input isn't sanitized via the contact_id variable before adding it to the end of an SQL query.

  • CVE-2017-1002004HigSep 14, 2017
    risk 0.49cvss 7.5epss 0.06

    Vulnerability in wordpress plugin DTracker v1.5, In file ./dtracker/download.php user input isn't sanitized via the id variable before adding it to the end of an SQL query.

  • CVE-2017-12710HigAug 30, 2017
    risk 0.49cvss 7.5epss 0.01

    A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information.

  • CVE-2017-1183HigJul 17, 2017
    risk 0.49cvss 7.5epss 0.01

    IBM Tivoli Monitoring Portal v6 could allow a local (network adjacent) attacker to modify SQL commands to the Portal Server, when default client-server communications, HTTP, are being used. IBM X-Force ID: 123494.

  • CVE-2017-4972HigJun 13, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v257; UAA release 2.x versions prior to v2.7.4.14, 3.6.x versions prior to v3.6.8, 3.9.x versions prior to v3.9.10, and other versions prior to v3.15.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.12, 24.x versions prior to v24.7, and other versions prior to v30. An attacker can use a blind SQL injection attack to query the contents of the UAA database.

  • CVE-2017-7236HigMay 26, 2017
    risk 0.49cvss 7.5epss 0.00

    SQL injection vulnerability in NetApp OnCommand Unified Manager Core Package 5.x before 5.2.2P1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

  • CVE-2017-7879HigApr 14, 2017
    risk 0.49cvss 7.5epss 0.00

    SQL Injection vulnerability in flatCore version 1.4.6 allows an attacker to read the content database.

  • CVE-2016-9728HigMar 7, 2017
    risk 0.49cvss 7.5epss 0.00

    IBM Qradar 7.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, information in the back-end database. IBM Reference #: 1999543.

  • CVE-2016-8930HigFeb 1, 2017
    risk 0.49cvss 7.6epss 0.00

    IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.

  • CVE-2016-8928HigFeb 1, 2017
    risk 0.49cvss 7.6epss 0.00

    IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.

  • CVE-2017-5598HigJan 27, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in eClinicalWorks healow@work 8.0 build 8. This is a blind SQL injection within the EmployeePortalServlet, which can be exploited by un-authenticated users via an HTTP POST request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects the EmployeePortalServlet page and the following parameter: employer.

  • CVE-2016-9864HigDec 11, 2016
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to inject SQL statements in the tracking functionality that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the MySQL database. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.

  • CVE-2016-6616HigDec 11, 2016
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in phpMyAdmin. In the "User group" and "Designer" features, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.

  • CVE-2016-9283HigNov 11, 2016
    risk 0.49cvss 7.5epss 0.00

    SQL Injection in framework/core/subsystems/expRouter.php in Exponent CMS v2.4.0 allows remote attackers to read database information via address/addContentToSearch/id/ and a trailing string, related to a "sef URL" issue.

  • CVE-2016-9282HigNov 11, 2016
    risk 0.49cvss 7.5epss 0.00

    SQL Injection in framework/modules/search/controllers/searchController.php in Exponent CMS v2.4.0 allows remote attackers to read database information via action=search&module=search with the search_string parameter.

  • CVE-2016-9184HigNov 4, 2016
    risk 0.49cvss 7.5epss 0.01

    In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.

  • CVE-2016-9135HigNov 3, 2016
    risk 0.49cvss 7.5epss 0.01

    Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/framework/modules/help/controllers/helpController.php" affecting the version parameter. Impact is Information Disclosure.