Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/ros | Exploit Third Party Advisory |
https://projectworlds.in | Product |
Configurations
History
13 Nov 2023, 17:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Projectworlds online Matrimonial Project
Projectworlds |
|
References | () https://fluidattacks.com/advisories/ros - Exploit, Third Party Advisory | |
References | () https://projectworlds.in - Product | |
CPE | cpe:2.3:a:projectworlds:online_matrimonial_project:1.0:*:*:*:*:*:*:* |
07 Nov 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-07 22:15
Updated : 2023-11-13 17:59
NVD link : CVE-2023-46793
Mitre link : CVE-2023-46793
JSON object : View
Products Affected
projectworlds
- online_matrimonial_project
CWE
No CWE.