Vulnerabilities (CVE)

Filtered by vendor Phpgurukul Subscribe
Filtered by product Medical Card Generation System
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-10298 1 Phpgurukul 1 Medical Card Generation System 2024-10-25 5.8 MEDIUM 7.2 HIGH
A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/edit-card-detail.php of the component Managecard Edit Card Detail Page. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10299 1 Phpgurukul 1 Medical Card Generation System 2024-10-25 5.8 MEDIUM 7.2 HIGH
A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/view-card-detail.php of the component Managecard View Detail Page. The manipulation of the argument viewid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10300 1 Phpgurukul 1 Medical Card Generation System 2024-10-25 5.8 MEDIUM 7.2 HIGH
A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/view-enquiry.php of the component View Enquiry Page. The manipulation of the argument viewid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10301 1 Phpgurukul 1 Medical Card Generation System 2024-10-25 5.8 MEDIUM 7.2 HIGH
A vulnerability, which was classified as critical, was found in PHPGurukul Medical Card Generation System 1.0. Affected is an unknown function of the file /admin/search-medicalcard.php of the component Search. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.