Description
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53575 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
History
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-06-17T20:29:09.908Z
Reserved: 2023-11-28T15:05:55.678Z
Link: CVE-2023-49633
Updated: 2024-08-02T22:01:25.687Z
Status : Modified
Published: 2024-01-04T14:15:40.243
Modified: 2024-11-21T08:33:39.267
Link: CVE-2023-49633
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD