does not validate the characters received and they
are sent unfiltered to the database.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48523 | The 'Email' parameter of the process_login.php resource does not validate the characters received and they are sent unfiltered to the database. |
Mon, 23 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-23T18:45:14.355Z
Reserved: 2023-09-26T15:21:50.712Z
Link: CVE-2023-44164
Updated: 2024-08-02T19:59:51.137Z
Status : Modified
Published: 2023-09-28T22:15:10.487
Modified: 2024-11-21T08:25:21.153
Link: CVE-2023-44164
No data.
OpenCVE Enrichment
No data.
EUVD