Report Title | Event ID | Severity | Vulnerability Type |
---|---|---|---|
Test user can query all patients | FirstBlood v2 | Medium | Application/Business Logic |
rXSS at /register.php | FirstBlood v2 | Medium | Reflective XSS |
Open Redirect on /logout.php | FirstBlood v2 | Low | Open Redirect |
rXSS on login.php leads to account takeover | FirstBlood v2 | Medium | Reflective XSS |
Account takeover via /drpanel/drapi/editpassword.php | FirstBlood v2 | CRITICAL | Application/Business Logic |
POST-based rXSS on login.php | FirstBlood v2 | Medium | Reflective XSS |
Stored XSS on /manageappointment.php | FirstBlood v2 | High | Stored XSS |
Stored XSS on /cancelled.php | FirstBlood v2 | High | Stored XSS |
RCE via PHAR deserialization on /api/checkproof.php | FirstBlood v2 | CRITICAL | Deserialization |
Leaked proofs of vaccination on /vaccination-manager/api/vax-proof-list.php | FirstBlood v2 | CRITICAL | Information leak/disclosure |
Stored XSS on /vaccination-manager/portal.php | FirstBlood v2 | High | Stored XSS |
Patients can still change their application email | FirstBlood v2 | Medium | Application/Business Logic |
Drpanel admin username enumeration | FirstBlood v2 | Low | Application/Business Logic |
SQL Injection on /vaccination-manager/login.php | FirstBlood v2 | CRITICAL | SQL Injection |
Server misconfigurations post-RCE | FirstBlood v2 | CRITICAL | Deserialization |