Description
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52485 | Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/ma/ |
|
| https://projectworlds.in/ |
|
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-13T15:02:46.639Z
Reserved: 2023-11-16T21:15:35.614Z
Link: CVE-2023-48434
Updated: 2024-08-02T21:30:35.379Z
Status : Modified
Published: 2023-12-20T21:15:07.900
Modified: 2024-11-21T08:31:43.057
Link: CVE-2023-48434
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD