Description
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52485 | Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/ma/ |
|
| https://projectworlds.in/ |
|
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-13T15:02:46.639Z
Reserved: 2023-11-16T21:15:35.614Z
Link: CVE-2023-48434
Updated: 2024-08-02T21:30:35.379Z
Status : Modified
Published: 2023-12-20T21:15:07.900
Modified: 2024-11-21T08:31:43.057
Link: CVE-2023-48434
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD