First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partner_preference.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-46785.
The severity of CVE-2023-46785 is critical.
The affected software of CVE-2023-46785 is Online Matrimonial Project v1.0.
This vulnerability occurs due to multiple unauthenticated SQL injection vulnerabilities in the 'id' parameter of the partner_preference.php resource in Online Matrimonial Project v1.0.
Yes, you can find references for this vulnerability at the following links: [1](https://fluidattacks.com/advisories/ros) and [2](https://projectworlds.in).