Page 18 of 88 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

OpenEMR before 5.0.0 Patch 5 allows unauthenticated remote database copying because setup.php exposes functionality for cloning an existing OpenEMR site to an arbitrary attacker-controlled MySQL server via vectors involving a crafted state parameter. OpenEMR en versiones anteriores a la 5.0.0 Patch 5 permite la copia remota sin autenticar de bases de datos debido a que setup.php expone la funcionalidad de clonado para un sitio OpenEMR existente a un servidor arbitrario controlado por el atacante, mediante vectores que implican un parámetro de estado manipulado. • http://www.open-emr.org/wiki/index.php/OpenEMR_Patches http://www.securityfocus.com/bid/101983 https://isears.github.io/jekyll/update/2017/10/28/openemr-database-disclosure.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 3

OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application. OpenEMR versión 5.0.0 y anteriores, permite a los usuarios poco privilegiados cargar archivos de tipos peligrosos, lo que puede resultar en la ejecución de código arbitraria en el contexto de la aplicación vulnerable. • https://www.exploit-db.com/exploits/49983 http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-9380-Exploit https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2017-002 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.0EPSS: 34%CPEs: 10EXPL: 0

interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_newpid.php and (2) interface/billing/sl_eob_search.php. interface/globals.php en OpenEMR 2.x, 3.x y 4.x en versiones anteriores a 4.2.0 patch 2 permite a atacantes remotos eludir la autenticación y obtener información sensible a través de un valor ignoreAuth=1 a ciertas secuencias, como se demuestra por (1) interface/fax/fax_dispatch_newpid.php y (2) interface/billing/sl_eob_search.php. • http://jvn.jp/en/jp/JVN22677713/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2015-000092 http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html http://seclists.org/fulldisclosure/2015/Jun/48 http://www.open-emr.org/wiki/index.php/OpenEMR_Patches http://www.securityfocus.com/bid/75299 • CWE-287: Improper Authentication •