Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T18:18:10.003Z
Reserved: 2023-08-07T00:00:00.000Z
Link: CVE-2023-39852
Updated: 2024-08-02T18:18:10.003Z
Status : Modified
Published: 2023-08-15T21:15:09.907
Modified: 2024-11-21T08:15:59.963
Link: CVE-2023-39852
No data.
OpenCVE Enrichment
No data.
Weaknesses