Submeter #574178: Sourcecodester Doctor's Appointment System 1.0 SQL Injectioninformação

TítuloSourcecodester Doctor's Appointment System 1.0 SQL Injection
DescriçãoA SQL injection vulnerability was found in the 'admin/delete-appointment.php' file of the 'Doctor's Appointment System' project. The reason for this issue is that attackers inject malicious code from the GET parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.No login or authorization is required to exploit this vulnerability.
Fonte⚠️ https://github.com/Xiaoyi-ing/CVE/issues/9
Utilizador
 me1ody (UID 84857)
Submissão09/05/2025 05h39 (há 12 meses)
Moderação16/05/2025 11h03 (7 days later)
EstadoAceite
Entrada VulDB309274 [Sourcecodester Doctor's Appointment System 1.0 GET Parameter delete-appointment.php ID Injeção SQL]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!