First published: Wed Mar 24 2021(Updated: )
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Doctors Appointment System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27320 is high with a severity value of 7.5.
CVE-2021-27320 affects Doctor Appointment System version 1.0.
CVE-2021-27320 is a blind SQL injection vulnerability.
An unauthenticated attacker can exploit CVE-2021-27320 by inserting malicious SQL queries via the firstname parameter in contactus.php.
Yes, you can find more information about CVE-2021-27320 at the following references: - [Packet Storm Security](http://packetstormsecurity.com/files/161642/Doctor-Appointment-System-1.0-Blind-SQL-Injection.html) - [Source Codester](https://www.sourcecodester.com/php/14182/doctor-appointment-system.html)