| Title | code-projects Patient Record Management System 1.0 SQL Injection |
|---|
| Description | An unrestricted SQL injection attack exists in patient-record-management-system-in-php in
xray_form.php. Th e parameters that can be controlled are as follows: $_GET[itr_no] . This
function executes the id parameter into the SQL statement without any restrictions. A malicious
attacker could exploit this vulnerability to obtain sensitive information in the server database. |
|---|
| Source | ⚠️ https://github.com/Damon-Gilbert/damon-blog/blob/main/cve-zy.pdf |
|---|
| User | Damon Gilbert (UID 87872) |
|---|
| Submission | 07/14/2025 05:46 (9 months ago) |
|---|
| Moderation | 07/17/2025 12:35 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 316744 [code-projects Patient Record Management System 1.0 /xray_form.php itr_no sql injection] |
|---|
| Points | 20 |
|---|