Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2022-36548

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability at /patient/settings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name text field.
Attacker Value
Unknown

CVE-2022-36547

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /patient/index.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field.
Attacker Value
Unknown

CVE-2022-36546

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a Cross-Site Request Forgery (CSRF) via /patient/settings.php.
Attacker Value
Unknown

CVE-2022-36545

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/settings.php.
Attacker Value
Unknown

CVE-2022-36544

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/booking.php.
Attacker Value
Unknown

CVE-2022-36543

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/doctors.php.
Attacker Value
Unknown

CVE-2022-36542

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
An access control issue in the component /ip/admin/ of Edoc-doctor-appointment-system v1.0.1 allows attackers to arbitrarily edit, read, and delete Administrator data.