First published: Wed Dec 22 2021(Updated: )
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Hospital Management System In Php | =1.0 | |
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-43631 is critical, with a severity value of 9.8.
The vulnerability in Projectworlds Hospital Management System v1.0 is SQL injection via the appointment_no parameter in payment.php.
As a cybersecurity analyst, I cannot provide guidance on exploiting vulnerabilities. It is important to follow ethical guidelines and not engage in any malicious activities.
To fix the SQL injection vulnerability in Projectworlds Hospital Management System v1.0, proper input validation and parameterized queries should be implemented to prevent unauthorized database access.
You can find more information about CVE-2021-43631 in the following references: [GitHub issue](https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5) and [Projectworlds website](https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/).