Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Online_covid_vaccination_scheduler_system
(Online_covid_vaccination_scheduler_system_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-07-30 | CVE-2021-36621 | Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator. | Online_covid_vaccination_scheduler_system | 8.1 | ||
2021-08-03 | CVE-2021-36622 | Sourcecodester Online Covid Vaccination Scheduler System 1.0 is affected vulnerable to Arbitrary File Upload. The admin panel has an upload function of profile photo accessible at http://localhost/scheduler/admin/?page=user. An attacker could upload a malicious file such as shell.php with the Content-Type: image/png. Then, the attacker have to visit the uploaded profile photo to access the shell. | Online_covid_vaccination_scheduler_system | 9.8 | ||
2021-10-27 | CVE-2021-37803 | An SQL Injection vulnerability exists in Sourcecodester Online Covid Vaccination Scheduler System 1.0 via the username in lognin.php . | Online_covid_vaccination_scheduler_system | 8.1 | ||
2022-01-24 | CVE-2021-41930 | Cross site scripting (XSS) vulnerability in Sourcecodester Online Covid Vaccination Scheduler System v1 by oretnom23, allows attackers to execute arbitrary code via the lid parameter to /scheduler/addSchedule.php. | Online_covid_vaccination_scheduler_system | 6.1 |