Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'e' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/perahia/ | Exploit Third Party Advisory |
https://www.kashipara.com/ | Product |
Configurations
History
10 Jan 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kashipara online Notice Board System
Kashipara |
|
CPE | cpe:2.3:a:kashipara:online_notice_board_system:1.0:*:*:*:*:*:*:* | |
References | () https://www.kashipara.com/ - Product | |
References | () https://fluidattacks.com/advisories/perahia/ - Exploit, Third Party Advisory |
04 Jan 2024, 14:58
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-04 14:15
Updated : 2024-01-10 01:13
NVD link : CVE-2023-50752
Mitre link : CVE-2023-50752
JSON object : View
Products Affected
kashipara
- online_notice_board_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')