Description
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partner_preference.php resource does not validate the characters received and they are sent unfiltered to the database.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50952 | Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partner_preference.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/ros |
|
| https://projectworlds.in |
|
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-17T13:31:25.770Z
Reserved: 2023-10-26T13:15:10.530Z
Link: CVE-2023-46785
Updated: 2024-08-02T20:53:21.850Z
Status : Modified
Published: 2023-11-07T21:15:12.563
Modified: 2024-11-21T08:29:19.163
Link: CVE-2023-46785
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD