PhpTpoint hospital management system suffers from multiple SQL injection vulnerabilities via the index.php user parameter associated with LOGIN.php, or the rno parameter to ALIST.php, DUNDEL.php, PDEL.php, or PUNDEL.php.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/149942/PHPTPoint-Hospital-Management-System-1-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-10-29 12:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18705
Mitre link : CVE-2018-18705
CVE.ORG link : CVE-2018-18705
JSON object : View
Products Affected
phptpoint
- hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')