Логотип exploitDog
bind:CVE-2023-39852
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-39852

Количество 2

Количество 2

nvd логотип

CVE-2023-39852

больше 2 лет назад

Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-ffcp-3x2p-58h7

больше 2 лет назад

Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39852

Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-ffcp-3x2p-58h7

Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу