A vulnerability was found in code-projects Matrimonial Site 1.0. It has been classified as critical. Affected is an unknown function of the file /auth/auth.php?user=1. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247344.
References
Link | Resource |
---|---|
https://github.com/850362564/BugHub/blob/main/Matrimonial%20Site%20System%20auth.php%20has%20Sqlinjection.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.247344 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.247344 | Permissions Required Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-12-10T11:00:05.615Z
Updated: 2023-12-10T11:00:05.615Z
Reserved: 2023-12-09T17:27:04.024Z
Link: CVE-2023-6651
JSON object: View
NVD Information
Status : Modified
Published: 2023-12-10T11:15:08.147
Modified: 2024-05-17T02:33:50.433
Link: CVE-2023-6651
JSON object: View
Redhat Information
No data.
CWE