Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g66q-8cf5-g99m

Опубликовано: 04 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected.

A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected.

EPSS

Процентиль: 23%
0.00076
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-707
CWE-89

Связанные уязвимости

CVSS3: 7.3
nvd
больше 1 года назад

A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected.

EPSS

Процентиль: 23%
0.00076
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-707
CWE-89