Description
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53567 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
History
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-06-17T20:29:09.786Z
Reserved: 2023-11-28T15:05:55.677Z
Link: CVE-2023-49625
Updated: 2024-08-02T22:01:25.743Z
Status : Modified
Published: 2024-01-04T14:15:40.037
Modified: 2024-11-21T08:33:39.143
Link: CVE-2023-49625
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD