Description
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'quantity[]' parameter of the submit_delivery_list.php resource does not validate the characters received and they are sent unfiltered to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53601 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'quantity[]' parameter of the submit_delivery_list.php resource does not validate the characters received and they are sent unfiltered to the database. |
References
History
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-06-17T20:29:10.314Z
Reserved: 2023-11-28T21:52:11.044Z
Link: CVE-2023-49665
Updated: 2024-08-02T22:01:25.820Z
Status : Modified
Published: 2024-01-04T14:15:40.860
Modified: 2024-11-21T08:33:40.623
Link: CVE-2023-49665
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD