Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/akshadjoshi/CVE-2023-38890 |
![]() ![]() |
History
Mon, 07 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-07T19:41:34.848Z
Reserved: 2023-07-25T00:00:00
Link: CVE-2023-38890

Updated: 2024-08-02T17:54:39.272Z

Status : Modified
Published: 2023-08-18T19:15:12.690
Modified: 2024-11-21T08:14:23.657
Link: CVE-2023-38890

No data.