Description
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/doctors.php.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-39250 | Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/doctors.php. |
References
History
Tue, 16 Dec 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashenudara
Hashenudara edoc-doctor-appointment-system |
|
| CPEs | cpe:2.3:a:hashenudara:edoc-doctor-appointment-system:1.0.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Edoc-doctor-appointment-system Project
Edoc-doctor-appointment-system Project edoc-doctor-appointment-system |
Hashenudara
Hashenudara edoc-doctor-appointment-system |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T10:07:34.455Z
Reserved: 2022-07-25T00:00:00.000Z
Link: CVE-2022-36543
No data.
Status : Analyzed
Published: 2022-08-26T21:15:08.977
Modified: 2025-12-16T19:29:58.437
Link: CVE-2022-36543
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD