CVE-2024-11057 – Codezips Hospital Appointment System removeBranchResult.php sql injection
https://notcve.org/view.php?id=CVE-2024-11057
A vulnerability has been found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /removeBranchResult.php. The manipulation of the argument ID/Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Hacker0xone/CVE/issues/4 https://vuldb.com/?ctiid.283801 https://vuldb.com/?id.283801 https://vuldb.com/?submit.439363 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10995 – Codezips Hospital Appointment System removeDoctorResult.php sql injection
https://notcve.org/view.php?id=CVE-2024-10995
A vulnerability was found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /removeDoctorResult.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Hacker0xone/CVE/issues/2 https://vuldb.com/?ctiid.283460 https://vuldb.com/?id.283460 https://vuldb.com/?submit.438428 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10991 – Codezips Hospital Appointment System editBranchResult.php sql injection
https://notcve.org/view.php?id=CVE-2024-10991
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/ppp-src/CVE/issues/30 https://vuldb.com/?ctiid.283457 https://vuldb.com/?id.283457 https://vuldb.com/?submit.437393 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10791 – Codezips Hospital Appointment System doctorAction.php sql injection
https://notcve.org/view.php?id=CVE-2024-10791
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/3127434/CVE/issues/2 https://vuldb.com/?ctiid.282989 https://vuldb.com/?id.282989 https://vuldb.com/?submit.436538 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-707: Improper Neutralization •
CVE-2024-10449 – Codezips Hospital Appointment System loginAction.php sql injection
https://notcve.org/view.php?id=CVE-2024-10449
A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/g-u-i-d/CVE-2024-10449-patch https://github.com/ppp-src/CVE/issues/25 https://vuldb.com/?ctiid.282009 https://vuldb.com/?id.282009 https://vuldb.com/?submit.432564 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •