A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Fri, 08 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Codezips
Codezips hospital Appointment System
CPEs cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*
Vendors & Products Codezips
Codezips hospital Appointment System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Codezips Hospital Appointment System editBranchResult.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-08T05:00:06.625Z

Updated: 2024-11-08T14:52:34.168Z

Reserved: 2024-11-07T20:28:53.485Z

Link: CVE-2024-10991

cve-icon Vulnrichment

Updated: 2024-11-08T14:52:00.025Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-08T05:15:06.127

Modified: 2024-11-08T19:01:03.880

Link: CVE-2024-10991

cve-icon Redhat

No data.