Description
Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 27 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T18:18:10.003Z
Reserved: 2023-08-07T00:00:00.000Z
Link: CVE-2023-39852
Updated: 2024-08-02T18:18:10.003Z
Status : Modified
Published: 2023-08-15T21:15:09.907
Modified: 2024-11-21T08:15:59.963
Link: CVE-2023-39852
No data.
OpenCVE Enrichment
No data.
Weaknesses