{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:04:09.310","vulnerabilities":[{"cve":{"id":"CVE-2021-43630","sourceIdentifier":"cve@mitre.org","published":"2021-12-22T18:15:07.813","lastModified":"2024-11-21T06:29:32.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server."},{"lang":"es","value":"Projectworlds Hospital Management System versión v1.0 es vulnerable a una inyección SQL por medio de múltiples parámetros en el archivo add_patient.php. Como resultado, un usuario malicioso autenticado puede comprometer el sistema de bases de datos y, en algunos casos, aprovechar esta vulnerabilidad para conseguir una ejecución de código remota en el servidor web remoto"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*","matchCriteriaId":"82B97C8D-6AD6-4944-B57B-639B6E56B703"}]}]}],"references":[{"url":"https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4","source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}