unauthenticated SQL Injection vulnerability on the
'email' parameter of index.php page, allowing an
external attacker to dump all the contents of the
database contents and bypass the login control.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47434 | Asset Management System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'email' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control. |
Mon, 23 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-23T18:49:40.194Z
Reserved: 2023-09-14T19:53:08.871Z
Link: CVE-2023-43013
Updated: 2024-08-02T19:37:23.133Z
Status : Modified
Published: 2023-09-28T21:15:10.037
Modified: 2024-11-21T08:23:37.430
Link: CVE-2023-43013
No data.
OpenCVE Enrichment
No data.
EUVD