Show filters
44 Total Results
Displaying 1-10 of 44
Sort by:
Attacker Value
Unknown

CVE-2024-6545

Disclosure Date: July 27, 2024 (last updated February 26, 2025)
The Admin Trim Interface plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.5.1. This is due to the plugin utilizing bootstrap and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0
Attacker Value
Unknown

CVE-2023-6652

Disclosure Date: December 10, 2023 (last updated February 25, 2025)
A vulnerability was found in code-projects Matrimonial Site 1.0. It has been declared as critical. Affected by this vulnerability is the function register of the file /register.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247345 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-6651

Disclosure Date: December 10, 2023 (last updated February 25, 2025)
A vulnerability was found in code-projects Matrimonial Site 1.0. It has been classified as critical. Affected is an unknown function of the file /auth/auth.php?user=1. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247344.
Attacker Value
Unknown

CVE-2023-46800

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the view_profile.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-46793

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-46789

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'filename' attribute of the 'pic1' multipart parameter of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-46788

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter in the 'uploadphoto()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-46787

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-46785

Disclosure Date: November 07, 2023 (last updated February 25, 2025)
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partner_preference.php resource does not validate the characters received and they are sent unfiltered to the database.
Attacker Value
Unknown

CVE-2023-39115

Disclosure Date: August 16, 2023 (last updated February 25, 2025)
install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Script 3.3 allows XSS via a crafted SVG document.

This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy.