PhpTpoint hospital management system suffers from multiple SQL injection vulnerabilities via the index.php user parameter associated with LOGIN.php, or the rno parameter to ALIST.php, DUNDEL.php, PDEL.php, or PUNDEL.php.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
| https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-10-29 12:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18705
Mitre link : CVE-2018-18705
CVE.ORG link : CVE-2018-18705
JSON object : View
Products Affected
phptpoint
- hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
