| Título | SourceCodester Doctor's Appointment System 1.0 SQL Injection |
|---|
| Descripción | A SQL injection vulnerability was found in the 'admin/appointment.php' file of the 'Doctor's Appointment System' project. The reason for this issue is that attackers inject malicious code from the GET parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.No login or authorization is required to exploit this vulnerability. |
|---|
| Fuente | ⚠️ https://github.com/Xiaoyi-ing/CVE/issues/8 |
|---|
| Usuario | me1ody (UID 84857) |
|---|
| Sumisión | 2025-05-09 05:18 (hace 12 meses) |
|---|
| Moderación | 2025-05-16 11:03 (7 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 309273 [SourceCodester Doctor's Appointment System 1.0 GET Parameter /admin/appointment.php ID inyección SQL] |
|---|
| Puntos | 20 |
|---|