Vulnerability Description
A vulnerability classified as problematic has been found in code-projects Hospital Management System 1.0. This affects an unknown part of the file /hospital/hms/admin/manage-doctors.php of the component Edit Doctor Details Page. The manipulation of the argument Doctor Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Hospital Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.289359Permissions RequiredVDB Entry
- https://vuldb.com/?id.289359Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.469215Third Party AdvisoryVDB Entry
- https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.mdExploitThird Party Advisory
FAQ
What is CVE-2024-12983?
CVE-2024-12983 is a vulnerability with a CVSS score of 2.4 (LOW). A vulnerability classified as problematic has been found in code-projects Hospital Management System 1.0. This affects an unknown part of the file /hospital/hms/admin/manage-doctors.php of the compone...
How severe is CVE-2024-12983?
CVE-2024-12983 has been rated LOW with a CVSS base score of 2.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12983?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Hospital Management System.