AI Score
Confidence
High
EPSS
Percentile
48.4%
SSVC
Exploitation
poc
Automatable
yes
Technical Impact
total
Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION[“userid”]=$_POST[“userid”] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
[
{
"cpes": [
"cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*"
],
"vendor": "doctor_appointment_system_project",
"product": "doctor_appointment_system",
"versions": [
{
"status": "affected",
"version": "1.0"
}
],
"defaultStatus": "unknown"
}
]