Une injection SQL est un type d'exploitation d'une faille de sécurité d'une application interagissant avec une base de données, en injectant une requête SQL non prévue par le système et pouvant compromettre sa sécurité.
Multiple SQL injection vulnerabilities in the Helpdesk Pro plugin before 1.4.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) ticket_code or (2) email parameter or (3) remote authenticated users to execute arbitrary SQL commands via the filter_order parameter. (CVSS:0.0) (Last Update:2017-09-20)
An issue was discovered in SugarCRM before 220.127.116.11, 7.8.x before 18.104.22.168, and 7.9.x before 22.214.171.124 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits. (CVSS:0.0) (Last Update:2017-09-17)
Vulnerability in wordpress plugin Event Expresso Free v126.96.36.199.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement. (CVSS:6.5) (Last Update:2017-09-20)
Vulnerability in wordpress plugin rk-responsive-contact-form v1.0, The variable $delid isn't sanitized before being passed into an SQL query in file ./rk-responsive-contact-form/include/rk_user_list.php. (CVSS:7.5) (Last Update:2017-09-20)
Vulnerability in wordpress plugin wordpress-gallery-transformation v1.0, SQL injection is in ./wordpress-gallery-transformation/gallery.php via $jpic parameter being unsanitized before being passed into an SQL query. (CVSS:0.0) (Last Update:2017-09-14)