Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database.
History

Tue, 13 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 May 2025 23:45:00 +0000

Type Values Removed Values Added
Description Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database.
Title Billing Software v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published: 2025-05-12T23:34:40.193Z

Updated: 2025-05-13T14:07:46.752Z

Reserved: 2023-11-28T15:05:55.679Z

Link: CVE-2023-49641

cve-icon Vulnrichment

Updated: 2025-05-13T14:07:43.368Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-13T00:15:17.770

Modified: 2025-05-13T19:35:25.503

Link: CVE-2023-49641

cve-icon Redhat

No data.