First published: Sun Jun 23 2024(Updated: )
A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as problematic. Affected by this vulnerability is the function save_patient of the file patient_side.php. The manipulation of the argument Full Name/Contact/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269485 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Clinic Queuing System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6273 is classified as a problematic vulnerability due to its potential to lead to cross-site scripting attacks.
To fix CVE-2024-6273, sanitize and validate user inputs in the save_patient function within the patient_side.php file.
CVE-2024-6273 affects SourceCodester Clinic Queuing System version 1.0.
The vulnerability in CVE-2024-6273 stems from improper handling of user inputs leading to cross-site scripting vulnerabilities.
The vendor for the affected software, SourceCodester Clinic Queuing System, is Oretnom23.