A vulnerability classified as critical was found in SourceCodester Doctors Appointment System 1.0. This vulnerability affects unknown code of the file /admin/doctors.php of the component Parameter Handler. The manipulation of the argument search/id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun3.pdf | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.221824 | Permissions Required VDB Entry |
| https://vuldb.com/?id.221824 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.95222 | Third Party Advisory VDB Entry |
| https://www.sourcecodester.com/ | Product |
| https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun3.pdf | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.221824 | Permissions Required VDB Entry |
| https://vuldb.com/?id.221824 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-02-27 12:15
Updated : 2025-09-27 00:31
NVD link : CVE-2023-1059
Mitre link : CVE-2023-1059
CVE.ORG link : CVE-2023-1059
JSON object : View
Products Affected
doctors_appointment_system_project
- doctors_appointment_system
