Vulnerabilities > Remoteclinic

DATE CVE VULNERABILITY TITLE RISK
2023-11-07 CVE-2023-33478 SQL Injection vulnerability in Remoteclinic Remote Clinic 2.0
RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php.
network
low complexity
remoteclinic CWE-89
critical
9.8
2023-11-07 CVE-2023-33479 SQL Injection vulnerability in Remoteclinic Remote Clinic 2.0
RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file.
network
low complexity
remoteclinic CWE-89
critical
9.8
2023-11-07 CVE-2023-33480 Unrestricted Upload of File with Dangerous Type vulnerability in Remoteclinic Remote Clinic 2.0
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell.
network
low complexity
remoteclinic CWE-434
8.8
2023-11-07 CVE-2023-33481 SQL Injection vulnerability in Remoteclinic Remote Clinic 2.0
RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php.
network
low complexity
remoteclinic CWE-89
critical
9.8
2023-01-20 CVE-2022-48152 SQL Injection vulnerability in Remoteclinic Remote Clinic 2.0
SQL Injection vulnerability in RemoteClinic 2.0 allows attackers to execute arbitrary commands and gain sensitive information via the id parameter to /medicines/profile.php.
network
low complexity
remoteclinic CWE-89
critical
9.8
2021-11-05 CVE-2021-39416 Cross-site Scripting vulnerability in Remoteclinic Remote Clinic 2.0
Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters.
network
low complexity
remoteclinic CWE-79
6.1
2021-04-21 CVE-2021-31329 Cross-site Scripting vulnerability in Remoteclinic Remote Clinic 2.0
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php
network
low complexity
remoteclinic CWE-79
5.4
2021-04-21 CVE-2021-31327 Cross-site Scripting vulnerability in Remoteclinic Remote Clinic 2.0
Stored XSS in Remote Clinic v2.0 in /medicines due to Medicine Name Field.
network
low complexity
remoteclinic CWE-79
5.4
2021-04-13 CVE-2021-30044 Cross-site Scripting vulnerability in Remoteclinic Remote Clinic 2.0
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the First Name or Last Name field on staff/register.php.
network
low complexity
remoteclinic CWE-79
5.4
2021-04-13 CVE-2021-30042 Cross-site Scripting vulnerability in Remoteclinic Remote Clinic 2.0
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Clinic Name", "Clinic Address", "Clinic City", or "Clinic Contact" field on clinics/register.php
network
low complexity
remoteclinic CWE-79
5.4