Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in SourceCodester Patients Waiting Area Queue Management System 1.0. The affected element is the function getPatientAppointment of the file /php/api_patient_checkin.php. Performing manipulation of the argument appointmentID results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. | |
| Title | SourceCodester Patients Waiting Area Queue Management System api_patient_checkin.php getPatientAppointment sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-13T19:34:41.727Z
Reserved: 2025-11-13T12:15:34.145Z
Link: CVE-2025-13122
Updated: 2025-11-13T19:34:36.473Z
Status : Received
Published: 2025-11-13T18:15:50.110
Modified: 2025-11-13T18:15:50.110
Link: CVE-2025-13122
No data.
OpenCVE Enrichment
No data.