A vulnerability was found in code-projects E-Health Care System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Doctor/user_appointment.php. The manipulation of the argument schedule_id/schedule_date/schedule_day/start_time/end_time/booking leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-33377 A vulnerability was found in code-projects E-Health Care System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Doctor/user_appointment.php. The manipulation of the argument schedule_id/schedule_date/schedule_day/start_time/end_time/booking leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00041}

epss

{'score': 0.00045}


Wed, 13 Nov 2024 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Anisha
Anisha e-health Care System
CPEs cpe:2.3:a:anisha:e-health_care_system:1.0:*:*:*:*:*:*:*
Vendors & Products Anisha
Anisha e-health Care System

Fri, 08 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects e-health Care System
CPEs cpe:2.3:a:code-projects:e-health_care_system:1.0:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects e-health Care System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 Nov 2024 03:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects E-Health Care System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Doctor/user_appointment.php. The manipulation of the argument schedule_id/schedule_date/schedule_day/start_time/end_time/booking leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title code-projects E-Health Care System user_appointment.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-11-08T15:05:50.651Z

Reserved: 2024-11-07T20:25:14.960Z

Link: CVE-2024-10987

cve-icon Vulnrichment

Updated: 2024-11-08T15:05:45.636Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-08T04:15:15.190

Modified: 2024-11-13T00:58:55.400

Link: CVE-2024-10987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.