0clickjacking0

Results 50 issues of 0clickjacking0

### Vulnerability file address `doctor/patient.php` from line 26,the problem is at line 36`header("location: ../login.php");`,there is no exit() termination statement after the header function in the else statement, so that the...

help wanted

### Vulnerability file address `patient/appointment.php` from line 54,The $sheduledate parameter is controllable, the parameter sheduledate can be passed through post, and the $sheduledate is not protected from sql injection, line...

sql-injection

### Vulnerability file address `patient/edit-user.php` from line 11,The $email parameter is controllable, the parameter email can be passed through post, and the $email is not protected from sql injection, line...

sql-injection

### Vulnerability file address `patient/schedule.php` from line 117,The $keyword parameter is controllable, the parameter search can be passed through post, and the $keyword is not protected from sql injection, line...

sql-injection

### Vulnerability file address `patient/booking-complete.php` from line 27,The $scheduleid parameter is controllable, the parameter scheduleid can be passed through post, and the $scheduleid is not protected from sql injection, line...

sql-injection

### Vulnerability file address `/patient/settings.php` from line 238,when $id performs a query operation, it does not determine whether the id is the current user id, which makes it possible for...

### Vulnerability file address `patient/patient.php` from line 26,the problem is at line 36`header("location: ../login.php");`,there is no exit() termination statement after the header function in the else statement, so that the...

### Vulnerability file address `doctor/doctors.php` from line 26,the problem is at line 36`header("location: ../login.php");`,there is no exit() termination statement after the header function in the else statement, so that the...

### Vulnerability file address `create-account.php` from line 43,The $email parameter is controllable, the parameter newemail can be passed through post, and the $email is not protected from sql injection, line...

Hello developers, can you add a version number?