Description
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50954 | Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/ros |
|
| https://projectworlds.in |
|
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-17T13:30:48.913Z
Reserved: 2023-10-26T13:15:10.530Z
Link: CVE-2023-46787
Updated: 2024-08-02T20:53:21.669Z
Status : Modified
Published: 2023-11-07T21:15:13.417
Modified: 2024-11-21T08:29:19.307
Link: CVE-2023-46787
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD