漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
PHPGurukul Hospital Management System POST Parameter edit-patient.php cross site scripting
漏洞信息
A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
PHPGurukul Hospital Management System 代码注入漏洞
漏洞信息
PHPGurukul Hospital Management System是PHPGurukul公司的一套基于PHP和MySQL的医院管理系统。 PHPGurukul Hospital Management System 4.0版本存在代码注入漏洞,该漏洞源于对文件/doctor/edit-patient.php中参数patname的错误操作导致跨站脚本。
漏洞信息
N/A
漏洞
N/A