A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Mon, 28 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Codezips
Codezips hospital Appointment System
CPEs cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*
Vendors & Products Codezips
Codezips hospital Appointment System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title Codezips Hospital Appointment System loginAction.php sql injection
Weaknesses CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-28T14:31:04.312Z

Updated: 2024-10-28T14:53:22.266Z

Reserved: 2024-10-28T06:21:59.300Z

Link: CVE-2024-10449

cve-icon Vulnrichment

Updated: 2024-10-28T14:53:16.917Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-28T15:15:04.303

Modified: 2024-10-31T12:47:08.810

Link: CVE-2024-10449

cve-icon Redhat

No data.