Projectworlds

Online Matrimonial Project

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 22:15:14
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the view_profile.php resource does not validate the characters received and they are sent unfiltered to the database.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 22:15:12
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfilt...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 21:15:13
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 21:15:13
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter in the 'uploadphoto()' function of the functions.php resource does not validate the characters received and they are sent unfi...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 21:15:13
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'filename' attribute of the 'pic1' multipart parameter of the functions.php resource does not validate the characters received and they are s...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.11.2023 21:15:12
  • Zuletzt bearbeitet 21.11.2024 08:29:19

Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partner_preference.php resource does not validate the characters received and they are sent unfiltered to the database....

Exploit
  • EPSS 2.23%
  • Veröffentlicht 23.12.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:10

Marital - Online Matrimonial Project In PHP version 1.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) on the Hosting web server via uploading a maliciously crafted PHP file.