Severity
6.9MEDIUM
EPSS
0.1%
top 74.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13
Latest updateMar 13

Description

A vulnerability classified as critical has been found in code-projects Online Appointment Booking System 1.0. This affects an unknown part of the file /ulocateus.php. The manipulation of the argument doctorname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

🔴Vulnerability Details

4
GHSA
PyJWT accepts unknown `crit` header extensions2026-03-13
GHSA
Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)2025-09-22
CVEList
code-projects Online Appointment Booking System ulocateus.php sql injection2025-07-13
GHSA
GHSA-22jv-4f49-gfvh: A vulnerability classified as critical has been found in code-projects Online Appointment Booking System 12025-07-13

📋Vendor Advisories

1
Red Hat
authlib: Authlib RFC violation2025-09-22
CVE-2025-7515 (MEDIUM CVSS 6.9) | A vulnerability classified as criti | cvebase.io