Code-Projects Online Hospital Management System V1.0 is vulnerable to SQL Injection (SQLI) attacks, which allow an attacker to manipulate the SQL queries executed by the application. The application fails to properly validate user-supplied input in the login id and password fields during the login process, enabling an attacker to inject malicious SQL code.
References
Configurations
Configuration 1 (hide)
|
History
25 Sep 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Aug 2023, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:online_hospital_management_system_project:online_hospital_management_system:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37069-Exploit.md - Exploit, Third Party Advisory | |
References | (MISC) https://code-projects.org/online-hospital-management-system-in-php-with-source-code/ - Product | |
CWE | CWE-89 | |
First Time |
Online Hospital Management System Project online Hospital Management System
Online Hospital Management System Project |
10 Aug 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-10 13:15
Updated : 2024-09-25 01:15
NVD link : CVE-2023-37069
Mitre link : CVE-2023-37069
CVE.ORG link : CVE-2023-37069
JSON object : View
Products Affected
online_hospital_management_system_project
- online_hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')